near fieldcommunications(NFC)businesstobusiness(B2B)goalseekingportaldistributeddenial ofservice(DDoS)proxyintellectualpropertyriskmatrixethicsDomainNameSystem(DNS)World WideWebConsortium(W3C)informationsecurityconsumertoconsumer(C2C)businesstoconsumer(B2C)phishingusabilitypaymentgatewaycrowdsourcingblogclickstreamdatasharedworkspacemalwareshoppingcartsoftwaresticknessmicrobloggingfirewallonlineanalyticalprocessing(OLAP)tagcloudcontentmanagementsystemintelligentagentssocialengineeringexpertsystemtop-leveldomaininformationprivacymobilecommerce(m-commerce)public keyencryptionhastagAJAXdashboardartificialintelligence(AI)optimizationwarroomassistivetechnologiesdigital rightsmanagement(DRM)naturallaws andrightsfiletransferprotocol(ftp://)multifactorauthenticationutilitarianisme-commercegroupdecisionsupportsystem(GDSS)webfeedhypertexttransferprotocol(http://)keyperformanceindicators (KPIs)click-throughrate(CTR)mediarichnesssearchengineoptimization(SEO)webbrowserwhat-ifanalysisinfomediaryvirtualrealitypresenceawarenessIMAP(Internet mailaccessprotocol)marketbasketanalysisinstantmessaging(IM)encryptiontextminingcookieincidenceresponseplanmicroformatsJavaScripttelepresenceCAPTCHAthird-partycookiesmultidimensionalwebsitearchitecturehypertextmarkuplanguage(HTML)SMTPservercascadingstylesheets(CSS)singlesign-onwebaccessibilityhierarchicalwebsitearchitectureconsumertobusiness(C2B)mashuppredictiveanalyticse-marketplaceunifiedcommunications(UC)neuralnetworkwebconferencingwikiforecastingInternetCorporation forAssignedNames andNumbers(ICANN)uniformresourcelocator(URL)sequentialwebsitearchitecturevirtualworldbotnetsnear fieldcommunications(NFC)businesstobusiness(B2B)goalseekingportaldistributeddenial ofservice(DDoS)proxyintellectualpropertyriskmatrixethicsDomainNameSystem(DNS)World WideWebConsortium(W3C)informationsecurityconsumertoconsumer(C2C)businesstoconsumer(B2C)phishingusabilitypaymentgatewaycrowdsourcingblogclickstreamdatasharedworkspacemalwareshoppingcartsoftwaresticknessmicrobloggingfirewallonlineanalyticalprocessing(OLAP)tagcloudcontentmanagementsystemintelligentagentssocialengineeringexpertsystemtop-leveldomaininformationprivacymobilecommerce(m-commerce)public keyencryptionhastagAJAXdashboardartificialintelligence(AI)optimizationwarroomassistivetechnologiesdigital rightsmanagement(DRM)naturallaws andrightsfiletransferprotocol(ftp://)multifactorauthenticationutilitarianisme-commercegroupdecisionsupportsystem(GDSS)webfeedhypertexttransferprotocol(http://)keyperformanceindicators (KPIs)click-throughrate(CTR)mediarichnesssearchengineoptimization(SEO)webbrowserwhat-ifanalysisinfomediaryvirtualrealitypresenceawarenessIMAP(Internet mailaccessprotocol)marketbasketanalysisinstantmessaging(IM)encryptiontextminingcookieincidenceresponseplanmicroformatsJavaScripttelepresenceCAPTCHAthird-partycookiesmultidimensionalwebsitearchitecturehypertextmarkuplanguage(HTML)SMTPservercascadingstylesheets(CSS)singlesign-onwebaccessibilityhierarchicalwebsitearchitectureconsumertobusiness(C2B)mashuppredictiveanalyticse-marketplaceunifiedcommunications(UC)neuralnetworkwebconferencingwikiforecastingInternetCorporation forAssignedNames andNumbers(ICANN)uniformresourcelocator(URL)sequentialwebsitearchitecturevirtualworldbotnets

Information Technology Terms Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
  1. near field communications (NFC)
  2. business to business (B2B)
  3. goal seeking
  4. portal
  5. distributed denial of service (DDoS)
  6. proxy
  7. intellectual property
  8. risk matrix
  9. ethics
  10. Domain Name System (DNS)
  11. World Wide Web Consortium (W3C)
  12. information security
  13. consumer to consumer (C2C)
  14. business to consumer (B2C)
  15. phishing
  16. usability
  17. payment gateway
  18. crowdsourcing
  19. blog
  20. clickstream data
  21. shared workspace
  22. malware
  23. shopping cart software
  24. stickness
  25. microblogging
  26. firewall
  27. online analytical processing (OLAP)
  28. tag cloud
  29. content management system
  30. intelligent agents
  31. social engineering
  32. expert system
  33. top-level domain
  34. information privacy
  35. mobile commerce (m-commerce)
  36. public key encryption
  37. hastag
  38. AJAX
  39. dashboard
  40. artificial intelligence (AI)
  41. optimization
  42. war room
  43. assistive technologies
  44. digital rights management (DRM)
  45. natural laws and rights
  46. file transfer protocol (ftp://)
  47. multifactor authentication
  48. utilitarianism
  49. e-commerce
  50. group decision support system (GDSS)
  51. web feed
  52. hypertext transfer protocol (http://)
  53. keyperformance indicators (KPIs)
  54. click-through rate (CTR)
  55. media richness
  56. search engine optimization (SEO)
  57. web browser
  58. what-if analysis
  59. infomediary
  60. virtual reality
  61. presence awareness
  62. IMAP (Internet mail access protocol)
  63. market basket analysis
  64. instant messaging (IM)
  65. encryption
  66. text mining
  67. cookie
  68. incidence response plan
  69. microformats
  70. JavaScript
  71. telepresence
  72. CAPTCHA
  73. third-party cookies
  74. multidimensional website architecture
  75. hypertext markup language (HTML)
  76. SMTP server
  77. cascading style sheets (CSS)
  78. single sign-on
  79. web accessibility
  80. hierarchical website architecture
  81. consumer to business (C2B)
  82. mashup
  83. predictive analytics
  84. e-marketplace
  85. unified communications (UC)
  86. neural network
  87. web conferencing
  88. wiki
  89. forecasting
  90. Internet Corporation for Assigned Names and Numbers (ICANN)
  91. uniform resource locator (URL)
  92. sequential website architecture
  93. virtual world
  94. botnets