Not reseasonable time Event Listener While Loop Crowdsourcing Callback Function DDoS Attack Creative Commons Data Type Lossy Abstratction Iterate Moore's Law Pixel Selection Caesar Cipher Citizen Science Random Substitution Cipher Function Round- off Binary Search Digital Divide Sequencing Open Access For Loop Heuristic Router ASCII Peer-to- Peer Networks High Level Prg. Language Undecidable Linear Search API Byte Metadata Binary Algorithm Phishing Scam Library Return Value Low Level Prg. Language Lossless Cloud Computing Overflow Concatenate Reasonable- time Conditionals Global Variable Network Redundancy Array Not reseasonable time Event Listener While Loop Crowdsourcing Callback Function DDoS Attack Creative Commons Data Type Lossy Abstratction Iterate Moore's Law Pixel Selection Caesar Cipher Citizen Science Random Substitution Cipher Function Round- off Binary Search Digital Divide Sequencing Open Access For Loop Heuristic Router ASCII Peer-to- Peer Networks High Level Prg. Language Undecidable Linear Search API Byte Metadata Binary Algorithm Phishing Scam Library Return Value Low Level Prg. Language Lossless Cloud Computing Overflow Concatenate Reasonable- time Conditionals Global Variable Network Redundancy Array
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
G-Not reseasonable time
N-Event Listener
N-While Loop
N-Crowdsourcing
I-Callback Function
O-DDoS Attack
G-Creative Commons
G-Data Type
N-Lossy
N-Abstratction
B-Iterate
B-Moore's Law
N-Pixel
I-Selection
G-Caesar Cipher
B-Citizen Science
N-Random Substitution Cipher
G-Function
I-Round-off
G-Binary Search
N-Digital Divide
B-Sequencing
O-Open Access
B-For Loop
O-Heuristic
I-Router
G-ASCII
I-Peer-to-Peer Networks
O-High Level Prg. Language
B-Undecidable
I-Linear Search
O-API
I-Byte
O-Metadata
O-Binary
G-Algorithm
B-Phishing Scam
O-Library
O-Return Value
I-Low Level Prg. Language
G-Lossless
I-Cloud Computing
B-Overflow
B-Concatenate
N-Reasonable-time
I-Conditionals
O-Global Variable
B-Network Redundancy
G-Array