digital signature digital certificate illicit server anit- virus software hash encryption Trojan Patch Encryption Internet Control Messaging Protocol (ICMP) Decryption Spyware Malware Hash symmetric encryption asymmetric encryption "The Right to Be Forgotten" Typosquatting Key Transport Layer Security (TLS) Firewall Secure Sockets Layer (SSL) non- repudiation Authentication screen saver digital signature digital certificate illicit server anit- virus software hash encryption Trojan Patch Encryption Internet Control Messaging Protocol (ICMP) Decryption Spyware Malware Hash symmetric encryption asymmetric encryption "The Right to Be Forgotten" Typosquatting Key Transport Layer Security (TLS) Firewall Secure Sockets Layer (SSL) non- repudiation Authentication screen saver
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
digital signature
digital certificate
illicit server
anit-virus software
hash encryption
Trojan
Patch
Encryption
Internet Control Messaging Protocol (ICMP)
Decryption
Spyware
Malware
Hash
symmetric encryption
asymmetric encryption
"The Right to Be Forgotten"
Typosquatting
Key
Transport
Layer Security (TLS)
Firewall
Secure Sockets Layer (SSL)
non-repudiation
Authentication
screen saver