virtualworldwikiartificialintelligence(AI)botnetsclickstreamdataSMTPserverriskmatrixhastagnear fieldcommunications(NFC)webaccessibilitysticknesspresenceawarenessutilitarianisminformationsecurityonlineanalyticalprocessing(OLAP)JavaScriptmarketbasketanalysissinglesign-oncascadingstylesheets(CSS)mashupinfomediarytagcloudusabilityInternetCorporation forAssignedNames andNumbers(ICANN)assistivetechnologiesthird-partycookiesinformationprivacyAJAXgoalseekingconsumertoconsumer(C2C)consumertobusiness(C2B)forecastingsearchengineoptimization(SEO)CAPTCHAhierarchicalwebsitearchitectureintelligentagentsIMAP(Internet mailaccessprotocol)microformatspaymentgatewayneuralnetworkdigital rightsmanagement(DRM)firewalluniformresourcelocator(URL)click-throughrate(CTR)public keyencryptionportaltextminingshoppingcartsoftwarewebfeeddashboarde-commercehypertexttransferprotocol(http://)businesstobusiness(B2B)contentmanagementsystemphishingbusinesstoconsumer(B2C)sharedworkspaceblogmultidimensionalwebsitearchitecturedistributeddenial ofservice(DDoS)optimizationvirtualrealitywarroomkeyperformanceindicators (KPIs)unifiedcommunications(UC)predictiveanalyticsethicswebconferencinghypertextmarkuplanguage(HTML)naturallaws andrightssocialengineeringWorld WideWebConsortium(W3C)DomainNameSystem(DNS)microbloggingmediarichnessfiletransferprotocol(ftp://)expertsystemincidenceresponseplangroupdecisionsupportsystem(GDSS)malwareencryptionintellectualpropertywebbrowsere-marketplaceinstantmessaging(IM)top-leveldomainproxytelepresencecrowdsourcingcookiewhat-ifanalysismultifactorauthenticationmobilecommerce(m-commerce)sequentialwebsitearchitecturevirtualworldwikiartificialintelligence(AI)botnetsclickstreamdataSMTPserverriskmatrixhastagnear fieldcommunications(NFC)webaccessibilitysticknesspresenceawarenessutilitarianisminformationsecurityonlineanalyticalprocessing(OLAP)JavaScriptmarketbasketanalysissinglesign-oncascadingstylesheets(CSS)mashupinfomediarytagcloudusabilityInternetCorporation forAssignedNames andNumbers(ICANN)assistivetechnologiesthird-partycookiesinformationprivacyAJAXgoalseekingconsumertoconsumer(C2C)consumertobusiness(C2B)forecastingsearchengineoptimization(SEO)CAPTCHAhierarchicalwebsitearchitectureintelligentagentsIMAP(Internet mailaccessprotocol)microformatspaymentgatewayneuralnetworkdigital rightsmanagement(DRM)firewalluniformresourcelocator(URL)click-throughrate(CTR)public keyencryptionportaltextminingshoppingcartsoftwarewebfeeddashboarde-commercehypertexttransferprotocol(http://)businesstobusiness(B2B)contentmanagementsystemphishingbusinesstoconsumer(B2C)sharedworkspaceblogmultidimensionalwebsitearchitecturedistributeddenial ofservice(DDoS)optimizationvirtualrealitywarroomkeyperformanceindicators (KPIs)unifiedcommunications(UC)predictiveanalyticsethicswebconferencinghypertextmarkuplanguage(HTML)naturallaws andrightssocialengineeringWorld WideWebConsortium(W3C)DomainNameSystem(DNS)microbloggingmediarichnessfiletransferprotocol(ftp://)expertsystemincidenceresponseplangroupdecisionsupportsystem(GDSS)malwareencryptionintellectualpropertywebbrowsere-marketplaceinstantmessaging(IM)top-leveldomainproxytelepresencecrowdsourcingcookiewhat-ifanalysismultifactorauthenticationmobilecommerce(m-commerce)sequentialwebsitearchitecture

Information Technology Terms Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
  1. virtual world
  2. wiki
  3. artificial intelligence (AI)
  4. botnets
  5. clickstream data
  6. SMTP server
  7. risk matrix
  8. hastag
  9. near field communications (NFC)
  10. web accessibility
  11. stickness
  12. presence awareness
  13. utilitarianism
  14. information security
  15. online analytical processing (OLAP)
  16. JavaScript
  17. market basket analysis
  18. single sign-on
  19. cascading style sheets (CSS)
  20. mashup
  21. infomediary
  22. tag cloud
  23. usability
  24. Internet Corporation for Assigned Names and Numbers (ICANN)
  25. assistive technologies
  26. third-party cookies
  27. information privacy
  28. AJAX
  29. goal seeking
  30. consumer to consumer (C2C)
  31. consumer to business (C2B)
  32. forecasting
  33. search engine optimization (SEO)
  34. CAPTCHA
  35. hierarchical website architecture
  36. intelligent agents
  37. IMAP (Internet mail access protocol)
  38. microformats
  39. payment gateway
  40. neural network
  41. digital rights management (DRM)
  42. firewall
  43. uniform resource locator (URL)
  44. click-through rate (CTR)
  45. public key encryption
  46. portal
  47. text mining
  48. shopping cart software
  49. web feed
  50. dashboard
  51. e-commerce
  52. hypertext transfer protocol (http://)
  53. business to business (B2B)
  54. content management system
  55. phishing
  56. business to consumer (B2C)
  57. shared workspace
  58. blog
  59. multidimensional website architecture
  60. distributed denial of service (DDoS)
  61. optimization
  62. virtual reality
  63. war room
  64. keyperformance indicators (KPIs)
  65. unified communications (UC)
  66. predictive analytics
  67. ethics
  68. web conferencing
  69. hypertext markup language (HTML)
  70. natural laws and rights
  71. social engineering
  72. World Wide Web Consortium (W3C)
  73. Domain Name System (DNS)
  74. microblogging
  75. media richness
  76. file transfer protocol (ftp://)
  77. expert system
  78. incidence response plan
  79. group decision support system (GDSS)
  80. malware
  81. encryption
  82. intellectual property
  83. web browser
  84. e-marketplace
  85. instant messaging (IM)
  86. top-level domain
  87. proxy
  88. telepresence
  89. crowdsourcing
  90. cookie
  91. what-if analysis
  92. multifactor authentication
  93. mobile commerce (m-commerce)
  94. sequential website architecture