High Level Prg. Language Algorithm Lossy Abstratction Cloud Computing Callback Function Reasonable- time Undecidable ASCII Lossless Citizen Science Metadata Return Value Data Type For Loop Overflow Router Round- off Sequencing Network Redundancy Concatenate Creative Commons While Loop Open Access Heuristic Not reseasonable time Caesar Cipher Byte Pixel Global Variable Iterate Library Peer-to- Peer Networks Selection Random Substitution Cipher Phishing Scam Low Level Prg. Language Binary Binary Search Moore's Law Array Crowdsourcing Function DDoS Attack API Digital Divide Linear Search Event Listener Conditionals High Level Prg. Language Algorithm Lossy Abstratction Cloud Computing Callback Function Reasonable- time Undecidable ASCII Lossless Citizen Science Metadata Return Value Data Type For Loop Overflow Router Round- off Sequencing Network Redundancy Concatenate Creative Commons While Loop Open Access Heuristic Not reseasonable time Caesar Cipher Byte Pixel Global Variable Iterate Library Peer-to- Peer Networks Selection Random Substitution Cipher Phishing Scam Low Level Prg. Language Binary Binary Search Moore's Law Array Crowdsourcing Function DDoS Attack API Digital Divide Linear Search Event Listener Conditionals
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
O-High Level Prg. Language
G-Algorithm
N-Lossy
N-Abstratction
I-Cloud Computing
I-Callback Function
N-Reasonable-time
B-Undecidable
G-ASCII
G-Lossless
B-Citizen Science
O-Metadata
O-Return Value
G-Data Type
B-For Loop
B-Overflow
I-Router
I-Round-off
B-Sequencing
B-Network Redundancy
B-Concatenate
G-Creative Commons
N-While Loop
O-Open Access
O-Heuristic
G-Not reseasonable time
G-Caesar Cipher
I-Byte
N-Pixel
O-Global Variable
B-Iterate
O-Library
I-Peer-to-Peer Networks
I-Selection
N-Random Substitution Cipher
B-Phishing Scam
I-Low Level Prg. Language
O-Binary
G-Binary Search
B-Moore's Law
G-Array
N-Crowdsourcing
G-Function
O-DDoS Attack
O-API
N-Digital Divide
I-Linear Search
N-Event Listener
I-Conditionals