asymmetric encryption Spyware Encryption digital signature screen saver Authentication non- repudiation illicit server Key hash encryption Decryption Malware symmetric encryption Typosquatting Transport Layer Security (TLS) Firewall digital certificate "The Right to Be Forgotten" Internet Control Messaging Protocol (ICMP) Patch anit- virus software Trojan Hash Secure Sockets Layer (SSL) asymmetric encryption Spyware Encryption digital signature screen saver Authentication non- repudiation illicit server Key hash encryption Decryption Malware symmetric encryption Typosquatting Transport Layer Security (TLS) Firewall digital certificate "The Right to Be Forgotten" Internet Control Messaging Protocol (ICMP) Patch anit- virus software Trojan Hash Secure Sockets Layer (SSL)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
asymmetric encryption
Spyware
Encryption
digital signature
screen saver
Authentication
non-repudiation
illicit server
Key
hash encryption
Decryption
Malware
symmetric encryption
Typosquatting
Transport
Layer Security (TLS)
Firewall
digital certificate
"The Right to Be Forgotten"
Internet Control Messaging Protocol (ICMP)
Patch
anit-virus software
Trojan
Hash
Secure Sockets Layer (SSL)