screensaveranit-virussoftware"TheRight toBeForgotten"digitalsignatureillicitserverAuthenticationnon-repudiationFirewallhashencryptiondigitalcertificatesymmetricencryptionHashTransportLayerSecurity(TLS)SpywareKeyTrojanPatchDecryptionasymmetricencryptionSecureSocketsLayer(SSL)InternetControlMessagingProtocol(ICMP)MalwareEncryptionTyposquattingscreensaveranit-virussoftware"TheRight toBeForgotten"digitalsignatureillicitserverAuthenticationnon-repudiationFirewallhashencryptiondigitalcertificatesymmetricencryptionHashTransportLayerSecurity(TLS)SpywareKeyTrojanPatchDecryptionasymmetricencryptionSecureSocketsLayer(SSL)InternetControlMessagingProtocol(ICMP)MalwareEncryptionTyposquatting

IBA Lesson 8 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. screen saver
  2. anit-virus software
  3. "The Right to Be Forgotten"
  4. digital signature
  5. illicit server
  6. Authentication
  7. non-repudiation
  8. Firewall
  9. hash encryption
  10. digital certificate
  11. symmetric encryption
  12. Hash
  13. Transport Layer Security (TLS)
  14. Spyware
  15. Key
  16. Trojan
  17. Patch
  18. Decryption
  19. asymmetric encryption
  20. Secure Sockets Layer (SSL)
  21. Internet Control Messaging Protocol (ICMP)
  22. Malware
  23. Encryption
  24. Typosquatting