"The Right to Be Forgotten" Decryption Internet Control Messaging Protocol (ICMP) non- repudiation illicit server hash encryption symmetric encryption anit- virus software asymmetric encryption Encryption Authentication Patch Transport Layer Security (TLS) digital certificate Firewall Key digital signature Hash Trojan Typosquatting screen saver Spyware Malware Secure Sockets Layer (SSL) "The Right to Be Forgotten" Decryption Internet Control Messaging Protocol (ICMP) non- repudiation illicit server hash encryption symmetric encryption anit- virus software asymmetric encryption Encryption Authentication Patch Transport Layer Security (TLS) digital certificate Firewall Key digital signature Hash Trojan Typosquatting screen saver Spyware Malware Secure Sockets Layer (SSL)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
"The Right to Be Forgotten"
Decryption
Internet Control Messaging Protocol (ICMP)
non-repudiation
illicit server
hash encryption
symmetric encryption
anit-virus software
asymmetric encryption
Encryption
Authentication
Patch
Transport
Layer Security (TLS)
digital certificate
Firewall
Key
digital signature
Hash
Trojan
Typosquatting
screen saver
Spyware
Malware
Secure Sockets Layer (SSL)