public keyencryptionmediarichnessmashupinstantmessaging(IM)crowdsourcingtextmininginfomediarymultidimensionalwebsitearchitectureJavaScriptonlineanalyticalprocessing(OLAP)neuralnetworkuniformresourcelocator(URL)intellectualpropertyshoppingcartsoftwarecookiepaymentgatewaywebaccessibilityfirewallgroupdecisionsupportsystem(GDSS)hypertexttransferprotocol(http://)hierarchicalwebsitearchitecturesequentialwebsitearchitecturewebfeedencryptiondigital rightsmanagement(DRM)optimizationassistivetechnologieswikivirtualworldincidenceresponseplanunifiedcommunications(UC)searchengineoptimization(SEO)naturallaws andrightsWorld WideWebConsortium(W3C)consumertoconsumer(C2C)hypertextmarkuplanguage(HTML)proxymarketbasketanalysisportalAJAXfiletransferprotocol(ftp://)consumertobusiness(C2B)riskmatrixpresenceawarenessgoalseekingforecastingintelligentagentsartificialintelligence(AI)CAPTCHAe-marketplaceInternetCorporation forAssignedNames andNumbers(ICANN)sharedworkspacecontentmanagementsystemphishingbotnetsDomainNameSystem(DNS)sticknessexpertsystemvirtualrealitymalwareblogwebconferencingkeyperformanceindicators (KPIs)distributeddenial ofservice(DDoS)dashboardclick-throughrate(CTR)businesstobusiness(B2B)SMTPserverethicsIMAP(Internet mailaccessprotocol)hastagsocialengineeringpredictiveanalyticsclickstreamdatawarroommobilecommerce(m-commerce)utilitarianismtop-leveldomainthird-partycookiestagcloudmultifactorauthenticationnear fieldcommunications(NFC)what-ifanalysisinformationsecuritysinglesign-onusabilitymicrobloggingcascadingstylesheets(CSS)telepresencebusinesstoconsumer(B2C)e-commerceinformationprivacywebbrowsermicroformatspublic keyencryptionmediarichnessmashupinstantmessaging(IM)crowdsourcingtextmininginfomediarymultidimensionalwebsitearchitectureJavaScriptonlineanalyticalprocessing(OLAP)neuralnetworkuniformresourcelocator(URL)intellectualpropertyshoppingcartsoftwarecookiepaymentgatewaywebaccessibilityfirewallgroupdecisionsupportsystem(GDSS)hypertexttransferprotocol(http://)hierarchicalwebsitearchitecturesequentialwebsitearchitecturewebfeedencryptiondigital rightsmanagement(DRM)optimizationassistivetechnologieswikivirtualworldincidenceresponseplanunifiedcommunications(UC)searchengineoptimization(SEO)naturallaws andrightsWorld WideWebConsortium(W3C)consumertoconsumer(C2C)hypertextmarkuplanguage(HTML)proxymarketbasketanalysisportalAJAXfiletransferprotocol(ftp://)consumertobusiness(C2B)riskmatrixpresenceawarenessgoalseekingforecastingintelligentagentsartificialintelligence(AI)CAPTCHAe-marketplaceInternetCorporation forAssignedNames andNumbers(ICANN)sharedworkspacecontentmanagementsystemphishingbotnetsDomainNameSystem(DNS)sticknessexpertsystemvirtualrealitymalwareblogwebconferencingkeyperformanceindicators (KPIs)distributeddenial ofservice(DDoS)dashboardclick-throughrate(CTR)businesstobusiness(B2B)SMTPserverethicsIMAP(Internet mailaccessprotocol)hastagsocialengineeringpredictiveanalyticsclickstreamdatawarroommobilecommerce(m-commerce)utilitarianismtop-leveldomainthird-partycookiestagcloudmultifactorauthenticationnear fieldcommunications(NFC)what-ifanalysisinformationsecuritysinglesign-onusabilitymicrobloggingcascadingstylesheets(CSS)telepresencebusinesstoconsumer(B2C)e-commerceinformationprivacywebbrowsermicroformats

Information Technology Terms Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
  1. public key encryption
  2. media richness
  3. mashup
  4. instant messaging (IM)
  5. crowdsourcing
  6. text mining
  7. infomediary
  8. multidimensional website architecture
  9. JavaScript
  10. online analytical processing (OLAP)
  11. neural network
  12. uniform resource locator (URL)
  13. intellectual property
  14. shopping cart software
  15. cookie
  16. payment gateway
  17. web accessibility
  18. firewall
  19. group decision support system (GDSS)
  20. hypertext transfer protocol (http://)
  21. hierarchical website architecture
  22. sequential website architecture
  23. web feed
  24. encryption
  25. digital rights management (DRM)
  26. optimization
  27. assistive technologies
  28. wiki
  29. virtual world
  30. incidence response plan
  31. unified communications (UC)
  32. search engine optimization (SEO)
  33. natural laws and rights
  34. World Wide Web Consortium (W3C)
  35. consumer to consumer (C2C)
  36. hypertext markup language (HTML)
  37. proxy
  38. market basket analysis
  39. portal
  40. AJAX
  41. file transfer protocol (ftp://)
  42. consumer to business (C2B)
  43. risk matrix
  44. presence awareness
  45. goal seeking
  46. forecasting
  47. intelligent agents
  48. artificial intelligence (AI)
  49. CAPTCHA
  50. e-marketplace
  51. Internet Corporation for Assigned Names and Numbers (ICANN)
  52. shared workspace
  53. content management system
  54. phishing
  55. botnets
  56. Domain Name System (DNS)
  57. stickness
  58. expert system
  59. virtual reality
  60. malware
  61. blog
  62. web conferencing
  63. keyperformance indicators (KPIs)
  64. distributed denial of service (DDoS)
  65. dashboard
  66. click-through rate (CTR)
  67. business to business (B2B)
  68. SMTP server
  69. ethics
  70. IMAP (Internet mail access protocol)
  71. hastag
  72. social engineering
  73. predictive analytics
  74. clickstream data
  75. war room
  76. mobile commerce (m-commerce)
  77. utilitarianism
  78. top-level domain
  79. third-party cookies
  80. tag cloud
  81. multifactor authentication
  82. near field communications (NFC)
  83. what-if analysis
  84. information security
  85. single sign-on
  86. usability
  87. microblogging
  88. cascading style sheets (CSS)
  89. telepresence
  90. business to consumer (B2C)
  91. e-commerce
  92. information privacy
  93. web browser
  94. microformats