instantmessaging(IM)tagcloudonlineanalyticalprocessing(OLAP)portalmultifactorauthenticationencryptione-marketplaceexpertsystemintelligentagentsbusinesstobusiness(B2B)firewalldigital rightsmanagement(DRM)cookieJavaScriptthird-partycookieswarroomsearchengineoptimization(SEO)mobilecommerce(m-commerce)contentmanagementsystemfiletransferprotocol(ftp://)presenceawarenessIMAP(Internet mailaccessprotocol)consumertoconsumer(C2C)neuralnetworkartificialintelligence(AI)CAPTCHAnaturallaws andrightsgoalseekingsequentialwebsitearchitecturehierarchicalwebsitearchitecturepredictiveanalyticspublic keyencryptionmicrobloggingtelepresencewikiphishingnear fieldcommunications(NFC)incidenceresponseplaninformationsecuritymarketbasketanalysisdistributeddenial ofservice(DDoS)webconferencingunifiedcommunications(UC)keyperformanceindicators (KPIs)what-ifanalysissinglesign-onmalwaree-commercevirtualworldSMTPserverhypertexttransferprotocol(http://)infomediarymicroformatstop-leveldomainpaymentgatewaycrowdsourcingintellectualpropertyhastagoptimizationforecastingWorld WideWebConsortium(W3C)proxywebbrowserconsumertobusiness(C2B)informationprivacyriskmatrixblogsharedworkspacedashboardusabilitymashupbotnetsutilitarianismclickstreamdataDomainNameSystem(DNS)hypertextmarkuplanguage(HTML)sticknesssocialengineeringAJAXInternetCorporation forAssignedNames andNumbers(ICANN)ethicscascadingstylesheets(CSS)mediarichnessuniformresourcelocator(URL)assistivetechnologiesclick-throughrate(CTR)textminingmultidimensionalwebsitearchitecturewebaccessibilityshoppingcartsoftwaregroupdecisionsupportsystem(GDSS)virtualrealitywebfeedbusinesstoconsumer(B2C)instantmessaging(IM)tagcloudonlineanalyticalprocessing(OLAP)portalmultifactorauthenticationencryptione-marketplaceexpertsystemintelligentagentsbusinesstobusiness(B2B)firewalldigital rightsmanagement(DRM)cookieJavaScriptthird-partycookieswarroomsearchengineoptimization(SEO)mobilecommerce(m-commerce)contentmanagementsystemfiletransferprotocol(ftp://)presenceawarenessIMAP(Internet mailaccessprotocol)consumertoconsumer(C2C)neuralnetworkartificialintelligence(AI)CAPTCHAnaturallaws andrightsgoalseekingsequentialwebsitearchitecturehierarchicalwebsitearchitecturepredictiveanalyticspublic keyencryptionmicrobloggingtelepresencewikiphishingnear fieldcommunications(NFC)incidenceresponseplaninformationsecuritymarketbasketanalysisdistributeddenial ofservice(DDoS)webconferencingunifiedcommunications(UC)keyperformanceindicators (KPIs)what-ifanalysissinglesign-onmalwaree-commercevirtualworldSMTPserverhypertexttransferprotocol(http://)infomediarymicroformatstop-leveldomainpaymentgatewaycrowdsourcingintellectualpropertyhastagoptimizationforecastingWorld WideWebConsortium(W3C)proxywebbrowserconsumertobusiness(C2B)informationprivacyriskmatrixblogsharedworkspacedashboardusabilitymashupbotnetsutilitarianismclickstreamdataDomainNameSystem(DNS)hypertextmarkuplanguage(HTML)sticknesssocialengineeringAJAXInternetCorporation forAssignedNames andNumbers(ICANN)ethicscascadingstylesheets(CSS)mediarichnessuniformresourcelocator(URL)assistivetechnologiesclick-throughrate(CTR)textminingmultidimensionalwebsitearchitecturewebaccessibilityshoppingcartsoftwaregroupdecisionsupportsystem(GDSS)virtualrealitywebfeedbusinesstoconsumer(B2C)

Information Technology Terms Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
  1. instant messaging (IM)
  2. tag cloud
  3. online analytical processing (OLAP)
  4. portal
  5. multifactor authentication
  6. encryption
  7. e-marketplace
  8. expert system
  9. intelligent agents
  10. business to business (B2B)
  11. firewall
  12. digital rights management (DRM)
  13. cookie
  14. JavaScript
  15. third-party cookies
  16. war room
  17. search engine optimization (SEO)
  18. mobile commerce (m-commerce)
  19. content management system
  20. file transfer protocol (ftp://)
  21. presence awareness
  22. IMAP (Internet mail access protocol)
  23. consumer to consumer (C2C)
  24. neural network
  25. artificial intelligence (AI)
  26. CAPTCHA
  27. natural laws and rights
  28. goal seeking
  29. sequential website architecture
  30. hierarchical website architecture
  31. predictive analytics
  32. public key encryption
  33. microblogging
  34. telepresence
  35. wiki
  36. phishing
  37. near field communications (NFC)
  38. incidence response plan
  39. information security
  40. market basket analysis
  41. distributed denial of service (DDoS)
  42. web conferencing
  43. unified communications (UC)
  44. keyperformance indicators (KPIs)
  45. what-if analysis
  46. single sign-on
  47. malware
  48. e-commerce
  49. virtual world
  50. SMTP server
  51. hypertext transfer protocol (http://)
  52. infomediary
  53. microformats
  54. top-level domain
  55. payment gateway
  56. crowdsourcing
  57. intellectual property
  58. hastag
  59. optimization
  60. forecasting
  61. World Wide Web Consortium (W3C)
  62. proxy
  63. web browser
  64. consumer to business (C2B)
  65. information privacy
  66. risk matrix
  67. blog
  68. shared workspace
  69. dashboard
  70. usability
  71. mashup
  72. botnets
  73. utilitarianism
  74. clickstream data
  75. Domain Name System (DNS)
  76. hypertext markup language (HTML)
  77. stickness
  78. social engineering
  79. AJAX
  80. Internet Corporation for Assigned Names and Numbers (ICANN)
  81. ethics
  82. cascading style sheets (CSS)
  83. media richness
  84. uniform resource locator (URL)
  85. assistive technologies
  86. click-through rate (CTR)
  87. text mining
  88. multidimensional website architecture
  89. web accessibility
  90. shopping cart software
  91. group decision support system (GDSS)
  92. virtual reality
  93. web feed
  94. business to consumer (B2C)