naturallaws andrightse-commerceforecastingincidenceresponseplantelepresenceutilitarianismkeyperformanceindicators (KPIs)botnetswikiinfomediaryproxyusabilityuniformresourcelocator(URL)filetransferprotocol(ftp://)tagcloudvirtualworldgoalseekingbloghierarchicalwebsitearchitectureconsumertobusiness(C2B)cookiemashupwebaccessibilityintellectualpropertyclickstreamdatawhat-ifanalysissharedworkspacethird-partycookiesmultifactorauthenticationdistributeddenial ofservice(DDoS)webbrowserpredictiveanalyticsdashboardhypertexttransferprotocol(http://)socialengineeringassistivetechnologiespublic keyencryptionportalwebconferencingethicsphishingexpertsystemcontentmanagementsystemwebfeedJavaScriptmicrobloggingpresenceawarenessunifiedcommunications(UC)hastagconsumertoconsumer(C2C)textminingfirewallneuralnetworkinformationsecuritynear fieldcommunications(NFC)IMAP(Internet mailaccessprotocol)riskmatrixoptimizationmultidimensionalwebsitearchitecturemobilecommerce(m-commerce)e-marketplaceclick-throughrate(CTR)SMTPserverwarroomintelligentagentssticknessartificialintelligence(AI)businesstoconsumer(B2C)cascadingstylesheets(CSS)crowdsourcingvirtualrealityAJAXtop-leveldomainCAPTCHAgroupdecisionsupportsystem(GDSS)World WideWebConsortium(W3C)hypertextmarkuplanguage(HTML)informationprivacymicroformatssinglesign-onencryptiondigital rightsmanagement(DRM)searchengineoptimization(SEO)onlineanalyticalprocessing(OLAP)instantmessaging(IM)DomainNameSystem(DNS)marketbasketanalysisshoppingcartsoftwaremediarichnesspaymentgatewaysequentialwebsitearchitecturebusinesstobusiness(B2B)InternetCorporation forAssignedNames andNumbers(ICANN)malwarenaturallaws andrightse-commerceforecastingincidenceresponseplantelepresenceutilitarianismkeyperformanceindicators (KPIs)botnetswikiinfomediaryproxyusabilityuniformresourcelocator(URL)filetransferprotocol(ftp://)tagcloudvirtualworldgoalseekingbloghierarchicalwebsitearchitectureconsumertobusiness(C2B)cookiemashupwebaccessibilityintellectualpropertyclickstreamdatawhat-ifanalysissharedworkspacethird-partycookiesmultifactorauthenticationdistributeddenial ofservice(DDoS)webbrowserpredictiveanalyticsdashboardhypertexttransferprotocol(http://)socialengineeringassistivetechnologiespublic keyencryptionportalwebconferencingethicsphishingexpertsystemcontentmanagementsystemwebfeedJavaScriptmicrobloggingpresenceawarenessunifiedcommunications(UC)hastagconsumertoconsumer(C2C)textminingfirewallneuralnetworkinformationsecuritynear fieldcommunications(NFC)IMAP(Internet mailaccessprotocol)riskmatrixoptimizationmultidimensionalwebsitearchitecturemobilecommerce(m-commerce)e-marketplaceclick-throughrate(CTR)SMTPserverwarroomintelligentagentssticknessartificialintelligence(AI)businesstoconsumer(B2C)cascadingstylesheets(CSS)crowdsourcingvirtualrealityAJAXtop-leveldomainCAPTCHAgroupdecisionsupportsystem(GDSS)World WideWebConsortium(W3C)hypertextmarkuplanguage(HTML)informationprivacymicroformatssinglesign-onencryptiondigital rightsmanagement(DRM)searchengineoptimization(SEO)onlineanalyticalprocessing(OLAP)instantmessaging(IM)DomainNameSystem(DNS)marketbasketanalysisshoppingcartsoftwaremediarichnesspaymentgatewaysequentialwebsitearchitecturebusinesstobusiness(B2B)InternetCorporation forAssignedNames andNumbers(ICANN)malware

Information Technology Terms Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
  1. natural laws and rights
  2. e-commerce
  3. forecasting
  4. incidence response plan
  5. telepresence
  6. utilitarianism
  7. keyperformance indicators (KPIs)
  8. botnets
  9. wiki
  10. infomediary
  11. proxy
  12. usability
  13. uniform resource locator (URL)
  14. file transfer protocol (ftp://)
  15. tag cloud
  16. virtual world
  17. goal seeking
  18. blog
  19. hierarchical website architecture
  20. consumer to business (C2B)
  21. cookie
  22. mashup
  23. web accessibility
  24. intellectual property
  25. clickstream data
  26. what-if analysis
  27. shared workspace
  28. third-party cookies
  29. multifactor authentication
  30. distributed denial of service (DDoS)
  31. web browser
  32. predictive analytics
  33. dashboard
  34. hypertext transfer protocol (http://)
  35. social engineering
  36. assistive technologies
  37. public key encryption
  38. portal
  39. web conferencing
  40. ethics
  41. phishing
  42. expert system
  43. content management system
  44. web feed
  45. JavaScript
  46. microblogging
  47. presence awareness
  48. unified communications (UC)
  49. hastag
  50. consumer to consumer (C2C)
  51. text mining
  52. firewall
  53. neural network
  54. information security
  55. near field communications (NFC)
  56. IMAP (Internet mail access protocol)
  57. risk matrix
  58. optimization
  59. multidimensional website architecture
  60. mobile commerce (m-commerce)
  61. e-marketplace
  62. click-through rate (CTR)
  63. SMTP server
  64. war room
  65. intelligent agents
  66. stickness
  67. artificial intelligence (AI)
  68. business to consumer (B2C)
  69. cascading style sheets (CSS)
  70. crowdsourcing
  71. virtual reality
  72. AJAX
  73. top-level domain
  74. CAPTCHA
  75. group decision support system (GDSS)
  76. World Wide Web Consortium (W3C)
  77. hypertext markup language (HTML)
  78. information privacy
  79. microformats
  80. single sign-on
  81. encryption
  82. digital rights management (DRM)
  83. search engine optimization (SEO)
  84. online analytical processing (OLAP)
  85. instant messaging (IM)
  86. Domain Name System (DNS)
  87. market basket analysis
  88. shopping cart software
  89. media richness
  90. payment gateway
  91. sequential website architecture
  92. business to business (B2B)
  93. Internet Corporation for Assigned Names and Numbers (ICANN)
  94. malware