sequentialwebsitearchitectureartificialintelligence(AI)e-marketplacepaymentgatewaycrowdsourcinghypertextmarkuplanguage(HTML)ethicsmicrobloggingsearchengineoptimization(SEO)virtualworldwebconferencingassistivetechnologiesInternetCorporation forAssignedNames andNumbers(ICANN)mobilecommerce(m-commerce)SMTPserverproxyusabilitynear fieldcommunications(NFC)businesstobusiness(B2B)informationsecurityfiletransferprotocol(ftp://)sharedworkspaceCAPTCHAdistributeddenial ofservice(DDoS)hierarchicalwebsitearchitecturewebfeedhastagtelepresencewebaccessibilitytextminingonlineanalyticalprocessing(OLAP)instantmessaging(IM)microformatsthird-partycookiesforecastingexpertsystemsinglesign-ondigital rightsmanagement(DRM)mediarichnessclick-throughrate(CTR)public keyencryptiongoalseekingblogvirtualrealitymashupwebbrowserpredictiveanalyticsneuralnetworkwikie-commercewarroomtop-leveldomaindashboardoptimizationphishingwhat-ifanalysissocialengineeringsticknessgroupdecisionsupportsystem(GDSS)JavaScriptmultifactorauthenticationcookieuniformresourcelocator(URL)unifiedcommunications(UC)AJAXincidenceresponseplaninfomediaryIMAP(Internet mailaccessprotocol)malwareclickstreamdatacascadingstylesheets(CSS)multidimensionalwebsitearchitectureconsumertoconsumer(C2C)firewallpresenceawarenessWorld WideWebConsortium(W3C)businesstoconsumer(B2C)hypertexttransferprotocol(http://)contentmanagementsystemkeyperformanceindicators (KPIs)encryptionutilitarianismportalDomainNameSystem(DNS)naturallaws andrightsshoppingcartsoftwareintellectualpropertyinformationprivacyriskmatrixmarketbasketanalysistagcloudintelligentagentsconsumertobusiness(C2B)botnetssequentialwebsitearchitectureartificialintelligence(AI)e-marketplacepaymentgatewaycrowdsourcinghypertextmarkuplanguage(HTML)ethicsmicrobloggingsearchengineoptimization(SEO)virtualworldwebconferencingassistivetechnologiesInternetCorporation forAssignedNames andNumbers(ICANN)mobilecommerce(m-commerce)SMTPserverproxyusabilitynear fieldcommunications(NFC)businesstobusiness(B2B)informationsecurityfiletransferprotocol(ftp://)sharedworkspaceCAPTCHAdistributeddenial ofservice(DDoS)hierarchicalwebsitearchitecturewebfeedhastagtelepresencewebaccessibilitytextminingonlineanalyticalprocessing(OLAP)instantmessaging(IM)microformatsthird-partycookiesforecastingexpertsystemsinglesign-ondigital rightsmanagement(DRM)mediarichnessclick-throughrate(CTR)public keyencryptiongoalseekingblogvirtualrealitymashupwebbrowserpredictiveanalyticsneuralnetworkwikie-commercewarroomtop-leveldomaindashboardoptimizationphishingwhat-ifanalysissocialengineeringsticknessgroupdecisionsupportsystem(GDSS)JavaScriptmultifactorauthenticationcookieuniformresourcelocator(URL)unifiedcommunications(UC)AJAXincidenceresponseplaninfomediaryIMAP(Internet mailaccessprotocol)malwareclickstreamdatacascadingstylesheets(CSS)multidimensionalwebsitearchitectureconsumertoconsumer(C2C)firewallpresenceawarenessWorld WideWebConsortium(W3C)businesstoconsumer(B2C)hypertexttransferprotocol(http://)contentmanagementsystemkeyperformanceindicators (KPIs)encryptionutilitarianismportalDomainNameSystem(DNS)naturallaws andrightsshoppingcartsoftwareintellectualpropertyinformationprivacyriskmatrixmarketbasketanalysistagcloudintelligentagentsconsumertobusiness(C2B)botnets

Information Technology Terms Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
  1. sequential website architecture
  2. artificial intelligence (AI)
  3. e-marketplace
  4. payment gateway
  5. crowdsourcing
  6. hypertext markup language (HTML)
  7. ethics
  8. microblogging
  9. search engine optimization (SEO)
  10. virtual world
  11. web conferencing
  12. assistive technologies
  13. Internet Corporation for Assigned Names and Numbers (ICANN)
  14. mobile commerce (m-commerce)
  15. SMTP server
  16. proxy
  17. usability
  18. near field communications (NFC)
  19. business to business (B2B)
  20. information security
  21. file transfer protocol (ftp://)
  22. shared workspace
  23. CAPTCHA
  24. distributed denial of service (DDoS)
  25. hierarchical website architecture
  26. web feed
  27. hastag
  28. telepresence
  29. web accessibility
  30. text mining
  31. online analytical processing (OLAP)
  32. instant messaging (IM)
  33. microformats
  34. third-party cookies
  35. forecasting
  36. expert system
  37. single sign-on
  38. digital rights management (DRM)
  39. media richness
  40. click-through rate (CTR)
  41. public key encryption
  42. goal seeking
  43. blog
  44. virtual reality
  45. mashup
  46. web browser
  47. predictive analytics
  48. neural network
  49. wiki
  50. e-commerce
  51. war room
  52. top-level domain
  53. dashboard
  54. optimization
  55. phishing
  56. what-if analysis
  57. social engineering
  58. stickness
  59. group decision support system (GDSS)
  60. JavaScript
  61. multifactor authentication
  62. cookie
  63. uniform resource locator (URL)
  64. unified communications (UC)
  65. AJAX
  66. incidence response plan
  67. infomediary
  68. IMAP (Internet mail access protocol)
  69. malware
  70. clickstream data
  71. cascading style sheets (CSS)
  72. multidimensional website architecture
  73. consumer to consumer (C2C)
  74. firewall
  75. presence awareness
  76. World Wide Web Consortium (W3C)
  77. business to consumer (B2C)
  78. hypertext transfer protocol (http://)
  79. content management system
  80. keyperformance indicators (KPIs)
  81. encryption
  82. utilitarianism
  83. portal
  84. Domain Name System (DNS)
  85. natural laws and rights
  86. shopping cart software
  87. intellectual property
  88. information privacy
  89. risk matrix
  90. market basket analysis
  91. tag cloud
  92. intelligent agents
  93. consumer to business (C2B)
  94. botnets