Creative Commons Iterate Moore's Law Byte While Loop Open Access Binary Search Selection Not reseasonable time Sequencing Algorithm Function Citizen Science High Level Prg. Language Return Value Round- off Concatenate Network Redundancy For Loop DDoS Attack Random Substitution Cipher Conditionals Heuristic Pixel Linear Search Low Level Prg. Language Cloud Computing Event Listener Digital Divide Lossless Router Callback Function Peer-to- Peer Networks Reasonable- time ASCII API Phishing Scam Overflow Undecidable Metadata Abstratction Array Caesar Cipher Lossy Global Variable Library Binary Crowdsourcing Data Type Creative Commons Iterate Moore's Law Byte While Loop Open Access Binary Search Selection Not reseasonable time Sequencing Algorithm Function Citizen Science High Level Prg. Language Return Value Round- off Concatenate Network Redundancy For Loop DDoS Attack Random Substitution Cipher Conditionals Heuristic Pixel Linear Search Low Level Prg. Language Cloud Computing Event Listener Digital Divide Lossless Router Callback Function Peer-to- Peer Networks Reasonable- time ASCII API Phishing Scam Overflow Undecidable Metadata Abstratction Array Caesar Cipher Lossy Global Variable Library Binary Crowdsourcing Data Type
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
G-Creative Commons
B-Iterate
B-Moore's Law
I-Byte
N-While Loop
O-Open Access
G-Binary Search
I-Selection
G-Not reseasonable time
B-Sequencing
G-Algorithm
G-Function
B-Citizen Science
O-High Level Prg. Language
O-Return Value
I-Round-off
B-Concatenate
B-Network Redundancy
B-For Loop
O-DDoS Attack
N-Random Substitution Cipher
I-Conditionals
O-Heuristic
N-Pixel
I-Linear Search
I-Low Level Prg. Language
I-Cloud Computing
N-Event Listener
N-Digital Divide
G-Lossless
I-Router
I-Callback Function
I-Peer-to-Peer Networks
N-Reasonable-time
G-ASCII
O-API
B-Phishing Scam
B-Overflow
B-Undecidable
O-Metadata
N-Abstratction
G-Array
G-Caesar Cipher
N-Lossy
O-Global Variable
O-Library
O-Binary
N-Crowdsourcing
G-Data Type