digitalsignaturedigitalcertificateillicitserveranit-virussoftwarehashencryptionTrojanPatchEncryptionInternetControlMessagingProtocol(ICMP)DecryptionSpywareMalwareHashsymmetricencryptionasymmetricencryption"TheRight toBeForgotten"TyposquattingKeyTransportLayerSecurity(TLS)FirewallSecureSocketsLayer(SSL)non-repudiationAuthenticationscreensaverdigitalsignaturedigitalcertificateillicitserveranit-virussoftwarehashencryptionTrojanPatchEncryptionInternetControlMessagingProtocol(ICMP)DecryptionSpywareMalwareHashsymmetricencryptionasymmetricencryption"TheRight toBeForgotten"TyposquattingKeyTransportLayerSecurity(TLS)FirewallSecureSocketsLayer(SSL)non-repudiationAuthenticationscreensaver

IBA Lesson 8 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. digital signature
  2. digital certificate
  3. illicit server
  4. anit-virus software
  5. hash encryption
  6. Trojan
  7. Patch
  8. Encryption
  9. Internet Control Messaging Protocol (ICMP)
  10. Decryption
  11. Spyware
  12. Malware
  13. Hash
  14. symmetric encryption
  15. asymmetric encryption
  16. "The Right to Be Forgotten"
  17. Typosquatting
  18. Key
  19. Transport Layer Security (TLS)
  20. Firewall
  21. Secure Sockets Layer (SSL)
  22. non-repudiation
  23. Authentication
  24. screen saver