Algorithm Event Listener Concatenate Binary Search Random Substitution Cipher Peer-to- Peer Networks Binary Byte Abstratction Return Value Selection Iterate Router Conditionals Round- off Linear Search Array Low Level Prg. Language Callback Function Digital Divide Lossy Library Moore's Law For Loop Reasonable- time Caesar Cipher Creative Commons Crowdsourcing Overflow Global Variable Heuristic Sequencing Pixel Undecidable Cloud Computing Lossless API Data Type ASCII While Loop DDoS Attack Metadata Phishing Scam Open Access Citizen Science Not reseasonable time High Level Prg. Language Network Redundancy Function Algorithm Event Listener Concatenate Binary Search Random Substitution Cipher Peer-to- Peer Networks Binary Byte Abstratction Return Value Selection Iterate Router Conditionals Round- off Linear Search Array Low Level Prg. Language Callback Function Digital Divide Lossy Library Moore's Law For Loop Reasonable- time Caesar Cipher Creative Commons Crowdsourcing Overflow Global Variable Heuristic Sequencing Pixel Undecidable Cloud Computing Lossless API Data Type ASCII While Loop DDoS Attack Metadata Phishing Scam Open Access Citizen Science Not reseasonable time High Level Prg. Language Network Redundancy Function
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
G-Algorithm
N-Event Listener
B-Concatenate
G-Binary Search
N-Random Substitution Cipher
I-Peer-to-Peer Networks
O-Binary
I-Byte
N-Abstratction
O-Return Value
I-Selection
B-Iterate
I-Router
I-Conditionals
I-Round-off
I-Linear Search
G-Array
I-Low Level Prg. Language
I-Callback Function
N-Digital Divide
N-Lossy
O-Library
B-Moore's Law
B-For Loop
N-Reasonable-time
G-Caesar Cipher
G-Creative Commons
N-Crowdsourcing
B-Overflow
O-Global Variable
O-Heuristic
B-Sequencing
N-Pixel
B-Undecidable
I-Cloud Computing
G-Lossless
O-API
G-Data Type
G-ASCII
N-While Loop
O-DDoS Attack
O-Metadata
B-Phishing Scam
O-Open Access
B-Citizen Science
G-Not reseasonable time
O-High Level Prg. Language
B-Network Redundancy
G-Function