hastag World Wide Web Consortium (W3C) stickness incidence response plan Internet Corporation for Assigned Names and Numbers (ICANN) IMAP (Internet mail access protocol) hypertext transfer protocol (http://) encryption AJAX file transfer protocol (ftp://) near field communications (NFC) uniform resource locator (URL) unified communications (UC) what-if analysis consumer to business (C2B) hierarchical website architecture ethics instant messaging (IM) Domain Name System (DNS) consumer to consumer (C2C) intellectual property business to consumer (B2C) payment gateway search engine optimization (SEO) digital rights management (DRM) tag cloud intelligent agents microformats assistive technologies natural laws and rights usability goal seeking web feed cascading style sheets (CSS) virtual reality wiki malware multidimensional website architecture single sign-on microblogging media richness business to business (B2B) third- party cookies sequential website architecture e- commerce mobile commerce (m- commerce) artificial intelligence (AI) distributed denial of service (DDoS) optimization shared workspace utilitarianism portal market basket analysis blog web conferencing infomediary multifactor authentication content management system firewall expert system top- level domain group decision support system (GDSS) web browser phishing social engineering risk matrix JavaScript text mining presence awareness proxy cookie online analytical processing (OLAP) click- through rate (CTR) dashboard information security shopping cart software crowdsourcing e- marketplace clickstream data war room mashup neural network CAPTCHA web accessibility telepresence predictive analytics botnets keyperformance indicators (KPIs) SMTP server public key encryption virtual world hypertext markup language (HTML) forecasting information privacy hastag World Wide Web Consortium (W3C) stickness incidence response plan Internet Corporation for Assigned Names and Numbers (ICANN) IMAP (Internet mail access protocol) hypertext transfer protocol (http://) encryption AJAX file transfer protocol (ftp://) near field communications (NFC) uniform resource locator (URL) unified communications (UC) what-if analysis consumer to business (C2B) hierarchical website architecture ethics instant messaging (IM) Domain Name System (DNS) consumer to consumer (C2C) intellectual property business to consumer (B2C) payment gateway search engine optimization (SEO) digital rights management (DRM) tag cloud intelligent agents microformats assistive technologies natural laws and rights usability goal seeking web feed cascading style sheets (CSS) virtual reality wiki malware multidimensional website architecture single sign-on microblogging media richness business to business (B2B) third- party cookies sequential website architecture e- commerce mobile commerce (m- commerce) artificial intelligence (AI) distributed denial of service (DDoS) optimization shared workspace utilitarianism portal market basket analysis blog web conferencing infomediary multifactor authentication content management system firewall expert system top- level domain group decision support system (GDSS) web browser phishing social engineering risk matrix JavaScript text mining presence awareness proxy cookie online analytical processing (OLAP) click- through rate (CTR) dashboard information security shopping cart software crowdsourcing e- marketplace clickstream data war room mashup neural network CAPTCHA web accessibility telepresence predictive analytics botnets keyperformance indicators (KPIs) SMTP server public key encryption virtual world hypertext markup language (HTML) forecasting information privacy
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
hastag
World Wide Web Consortium (W3C)
stickness
incidence response plan
Internet Corporation for Assigned Names and Numbers (ICANN)
IMAP (Internet mail access protocol)
hypertext transfer protocol (http://)
encryption
AJAX
file transfer protocol (ftp://)
near field communications (NFC)
uniform resource locator (URL)
unified communications (UC)
what-if analysis
consumer to business (C2B)
hierarchical website architecture
ethics
instant messaging (IM)
Domain Name System (DNS)
consumer to consumer (C2C)
intellectual property
business to consumer (B2C)
payment gateway
search engine optimization (SEO)
digital rights management (DRM)
tag cloud
intelligent agents
microformats
assistive technologies
natural laws and rights
usability
goal seeking
web feed
cascading style sheets (CSS)
virtual reality
wiki
malware
multidimensional website architecture
single sign-on
microblogging
media richness
business to business (B2B)
third-party cookies
sequential website architecture
e-commerce
mobile commerce (m-commerce)
artificial intelligence (AI)
distributed denial of service (DDoS)
optimization
shared workspace
utilitarianism
portal
market basket analysis
blog
web conferencing
infomediary
multifactor authentication
content management system
firewall
expert system
top-level domain
group decision support system (GDSS)
web browser
phishing
social engineering
risk matrix
JavaScript
text mining
presence awareness
proxy
cookie
online analytical processing (OLAP)
click-through rate (CTR)
dashboard
information security
shopping cart software
crowdsourcing
e-marketplace
clickstream data
war room
mashup
neural network
CAPTCHA
web accessibility
telepresence
predictive analytics
botnets
keyperformance indicators (KPIs)
SMTP server
public key encryption
virtual world
hypertext markup language (HTML)
forecasting
information privacy