socialengineeringnaturallaws andrightssearchengineoptimization(SEO)hastagmashupmultifactorauthenticationshoppingcartsoftwaremicrobloggingconsumertobusiness(C2B)third-partycookiessharedworkspacetextmininginstantmessaging(IM)DomainNameSystem(DNS)proxyforecastinge-commerceexpertsystemencryptiononlineanalyticalprocessing(OLAP)warroomJavaScripttelepresencewebbrowsermalwaredigital rightsmanagement(DRM)tagcloudmarketbasketanalysisInternetCorporation forAssignedNames andNumbers(ICANN)hierarchicalwebsitearchitecturegroupdecisionsupportsystem(GDSS)AJAXwebfeedportalpredictiveanalyticscrowdsourcingIMAP(Internet mailaccessprotocol)e-marketplaceartificialintelligence(AI)World WideWebConsortium(W3C)singlesign-onhypertextmarkuplanguage(HTML)filetransferprotocol(ftp://)presenceawarenesshypertexttransferprotocol(http://)near fieldcommunications(NFC)neuralnetworkwebconferencingphishingdashboardmultidimensionalwebsitearchitectureCAPTCHAoptimizationutilitarianisminfomediarycontentmanagementsystemunifiedcommunications(UC)keyperformanceindicators (KPIs)firewallclick-throughrate(CTR)goalseekingriskmatrixdistributeddenial ofservice(DDoS)virtualrealitymediarichnesssequentialwebsitearchitecturesticknessincidenceresponseplancascadingstylesheets(CSS)webaccessibilitybotnetsinformationprivacymobilecommerce(m-commerce)top-leveldomainwikivirtualworldintellectualpropertycookiepublic keyencryptionpaymentgatewayconsumertoconsumer(C2C)usabilitybusinesstoconsumer(B2C)ethicsSMTPserverwhat-ifanalysismicroformatsblogbusinesstobusiness(B2B)uniformresourcelocator(URL)intelligentagentsinformationsecurityassistivetechnologiesclickstreamdatasocialengineeringnaturallaws andrightssearchengineoptimization(SEO)hastagmashupmultifactorauthenticationshoppingcartsoftwaremicrobloggingconsumertobusiness(C2B)third-partycookiessharedworkspacetextmininginstantmessaging(IM)DomainNameSystem(DNS)proxyforecastinge-commerceexpertsystemencryptiononlineanalyticalprocessing(OLAP)warroomJavaScripttelepresencewebbrowsermalwaredigital rightsmanagement(DRM)tagcloudmarketbasketanalysisInternetCorporation forAssignedNames andNumbers(ICANN)hierarchicalwebsitearchitecturegroupdecisionsupportsystem(GDSS)AJAXwebfeedportalpredictiveanalyticscrowdsourcingIMAP(Internet mailaccessprotocol)e-marketplaceartificialintelligence(AI)World WideWebConsortium(W3C)singlesign-onhypertextmarkuplanguage(HTML)filetransferprotocol(ftp://)presenceawarenesshypertexttransferprotocol(http://)near fieldcommunications(NFC)neuralnetworkwebconferencingphishingdashboardmultidimensionalwebsitearchitectureCAPTCHAoptimizationutilitarianisminfomediarycontentmanagementsystemunifiedcommunications(UC)keyperformanceindicators (KPIs)firewallclick-throughrate(CTR)goalseekingriskmatrixdistributeddenial ofservice(DDoS)virtualrealitymediarichnesssequentialwebsitearchitecturesticknessincidenceresponseplancascadingstylesheets(CSS)webaccessibilitybotnetsinformationprivacymobilecommerce(m-commerce)top-leveldomainwikivirtualworldintellectualpropertycookiepublic keyencryptionpaymentgatewayconsumertoconsumer(C2C)usabilitybusinesstoconsumer(B2C)ethicsSMTPserverwhat-ifanalysismicroformatsblogbusinesstobusiness(B2B)uniformresourcelocator(URL)intelligentagentsinformationsecurityassistivetechnologiesclickstreamdata

Information Technology Terms Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
  1. social engineering
  2. natural laws and rights
  3. search engine optimization (SEO)
  4. hastag
  5. mashup
  6. multifactor authentication
  7. shopping cart software
  8. microblogging
  9. consumer to business (C2B)
  10. third-party cookies
  11. shared workspace
  12. text mining
  13. instant messaging (IM)
  14. Domain Name System (DNS)
  15. proxy
  16. forecasting
  17. e-commerce
  18. expert system
  19. encryption
  20. online analytical processing (OLAP)
  21. war room
  22. JavaScript
  23. telepresence
  24. web browser
  25. malware
  26. digital rights management (DRM)
  27. tag cloud
  28. market basket analysis
  29. Internet Corporation for Assigned Names and Numbers (ICANN)
  30. hierarchical website architecture
  31. group decision support system (GDSS)
  32. AJAX
  33. web feed
  34. portal
  35. predictive analytics
  36. crowdsourcing
  37. IMAP (Internet mail access protocol)
  38. e-marketplace
  39. artificial intelligence (AI)
  40. World Wide Web Consortium (W3C)
  41. single sign-on
  42. hypertext markup language (HTML)
  43. file transfer protocol (ftp://)
  44. presence awareness
  45. hypertext transfer protocol (http://)
  46. near field communications (NFC)
  47. neural network
  48. web conferencing
  49. phishing
  50. dashboard
  51. multidimensional website architecture
  52. CAPTCHA
  53. optimization
  54. utilitarianism
  55. infomediary
  56. content management system
  57. unified communications (UC)
  58. keyperformance indicators (KPIs)
  59. firewall
  60. click-through rate (CTR)
  61. goal seeking
  62. risk matrix
  63. distributed denial of service (DDoS)
  64. virtual reality
  65. media richness
  66. sequential website architecture
  67. stickness
  68. incidence response plan
  69. cascading style sheets (CSS)
  70. web accessibility
  71. botnets
  72. information privacy
  73. mobile commerce (m-commerce)
  74. top-level domain
  75. wiki
  76. virtual world
  77. intellectual property
  78. cookie
  79. public key encryption
  80. payment gateway
  81. consumer to consumer (C2C)
  82. usability
  83. business to consumer (B2C)
  84. ethics
  85. SMTP server
  86. what-if analysis
  87. microformats
  88. blog
  89. business to business (B2B)
  90. uniform resource locator (URL)
  91. intelligent agents
  92. information security
  93. assistive technologies
  94. clickstream data