Open Access Router Moore's Law Citizen Science Cloud Computing Lossless Metadata Callback Function Selection Not reseasonable time Digital Divide Low Level Prg. Language Phishing Scam Sequencing Iterate Binary For Loop Network Redundancy Function Lossy Heuristic Reasonable- time Event Listener Concatenate Peer-to- Peer Networks Byte Library Data Type Creative Commons Algorithm Return Value DDoS Attack Linear Search ASCII Pixel Array API Round- off Random Substitution Cipher Global Variable Conditionals Overflow Caesar Cipher High Level Prg. Language Crowdsourcing Abstratction Binary Search While Loop Undecidable Open Access Router Moore's Law Citizen Science Cloud Computing Lossless Metadata Callback Function Selection Not reseasonable time Digital Divide Low Level Prg. Language Phishing Scam Sequencing Iterate Binary For Loop Network Redundancy Function Lossy Heuristic Reasonable- time Event Listener Concatenate Peer-to- Peer Networks Byte Library Data Type Creative Commons Algorithm Return Value DDoS Attack Linear Search ASCII Pixel Array API Round- off Random Substitution Cipher Global Variable Conditionals Overflow Caesar Cipher High Level Prg. Language Crowdsourcing Abstratction Binary Search While Loop Undecidable
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
O-Open Access
I-Router
B-Moore's Law
B-Citizen Science
I-Cloud Computing
G-Lossless
O-Metadata
I-Callback Function
I-Selection
G-Not reseasonable time
N-Digital Divide
I-Low Level Prg. Language
B-Phishing Scam
B-Sequencing
B-Iterate
O-Binary
B-For Loop
B-Network Redundancy
G-Function
N-Lossy
O-Heuristic
N-Reasonable-time
N-Event Listener
B-Concatenate
I-Peer-to-Peer Networks
I-Byte
O-Library
G-Data Type
G-Creative Commons
G-Algorithm
O-Return Value
O-DDoS Attack
I-Linear Search
G-ASCII
N-Pixel
G-Array
O-API
I-Round-off
N-Random Substitution Cipher
O-Global Variable
I-Conditionals
B-Overflow
G-Caesar Cipher
O-High Level Prg. Language
N-Crowdsourcing
N-Abstratction
G-Binary Search
N-While Loop
B-Undecidable