utilitarianismmediarichnessthird-partycookiesportalassistivetechnologiessearchengineoptimization(SEO)informationprivacyWorld WideWebConsortium(W3C)AJAXCAPTCHAwebaccessibilitysticknesswarroomkeyperformanceindicators (KPIs)microformatsintelligentagentsJavaScriptartificialintelligence(AI)virtualworldwebconferencingblogtagcloudwikisocialengineeringdashboardpredictiveanalyticsconsumertobusiness(C2B)webbrowserbusinesstoconsumer(B2C)naturallaws andrightssinglesign-onInternetCorporation forAssignedNames andNumbers(ICANN)ethicsDomainNameSystem(DNS)phishingmultidimensionalwebsitearchitectureunifiedcommunications(UC)hypertexttransferprotocol(http://)instantmessaging(IM)distributeddenial ofservice(DDoS)near fieldcommunications(NFC)proxymultifactorauthenticatione-marketplacetelepresenceconsumertoconsumer(C2C)usabilitypresenceawarenesssequentialwebsitearchitectureexpertsystemclickstreamdataintellectualpropertye-commercepaymentgatewayoptimizationmashupneuralnetworktop-leveldomainbusinesstobusiness(B2B)SMTPserverinfomediarybotnetswebfeedIMAP(Internet mailaccessprotocol)textminingriskmatrixgroupdecisionsupportsystem(GDSS)uniformresourcelocator(URL)sharedworkspaceencryptionvirtualrealitygoalseekingforecastingmicrobloggingclick-throughrate(CTR)firewallhypertextmarkuplanguage(HTML)public keyencryptionmobilecommerce(m-commerce)crowdsourcingonlineanalyticalprocessing(OLAP)digital rightsmanagement(DRM)cookiewhat-ifanalysisfiletransferprotocol(ftp://)shoppingcartsoftwarehierarchicalwebsitearchitectureincidenceresponseplancascadingstylesheets(CSS)marketbasketanalysisinformationsecuritymalwarehastagcontentmanagementsystemutilitarianismmediarichnessthird-partycookiesportalassistivetechnologiessearchengineoptimization(SEO)informationprivacyWorld WideWebConsortium(W3C)AJAXCAPTCHAwebaccessibilitysticknesswarroomkeyperformanceindicators (KPIs)microformatsintelligentagentsJavaScriptartificialintelligence(AI)virtualworldwebconferencingblogtagcloudwikisocialengineeringdashboardpredictiveanalyticsconsumertobusiness(C2B)webbrowserbusinesstoconsumer(B2C)naturallaws andrightssinglesign-onInternetCorporation forAssignedNames andNumbers(ICANN)ethicsDomainNameSystem(DNS)phishingmultidimensionalwebsitearchitectureunifiedcommunications(UC)hypertexttransferprotocol(http://)instantmessaging(IM)distributeddenial ofservice(DDoS)near fieldcommunications(NFC)proxymultifactorauthenticatione-marketplacetelepresenceconsumertoconsumer(C2C)usabilitypresenceawarenesssequentialwebsitearchitectureexpertsystemclickstreamdataintellectualpropertye-commercepaymentgatewayoptimizationmashupneuralnetworktop-leveldomainbusinesstobusiness(B2B)SMTPserverinfomediarybotnetswebfeedIMAP(Internet mailaccessprotocol)textminingriskmatrixgroupdecisionsupportsystem(GDSS)uniformresourcelocator(URL)sharedworkspaceencryptionvirtualrealitygoalseekingforecastingmicrobloggingclick-throughrate(CTR)firewallhypertextmarkuplanguage(HTML)public keyencryptionmobilecommerce(m-commerce)crowdsourcingonlineanalyticalprocessing(OLAP)digital rightsmanagement(DRM)cookiewhat-ifanalysisfiletransferprotocol(ftp://)shoppingcartsoftwarehierarchicalwebsitearchitectureincidenceresponseplancascadingstylesheets(CSS)marketbasketanalysisinformationsecuritymalwarehastagcontentmanagementsystem

Information Technology Terms Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
  1. utilitarianism
  2. media richness
  3. third-party cookies
  4. portal
  5. assistive technologies
  6. search engine optimization (SEO)
  7. information privacy
  8. World Wide Web Consortium (W3C)
  9. AJAX
  10. CAPTCHA
  11. web accessibility
  12. stickness
  13. war room
  14. keyperformance indicators (KPIs)
  15. microformats
  16. intelligent agents
  17. JavaScript
  18. artificial intelligence (AI)
  19. virtual world
  20. web conferencing
  21. blog
  22. tag cloud
  23. wiki
  24. social engineering
  25. dashboard
  26. predictive analytics
  27. consumer to business (C2B)
  28. web browser
  29. business to consumer (B2C)
  30. natural laws and rights
  31. single sign-on
  32. Internet Corporation for Assigned Names and Numbers (ICANN)
  33. ethics
  34. Domain Name System (DNS)
  35. phishing
  36. multidimensional website architecture
  37. unified communications (UC)
  38. hypertext transfer protocol (http://)
  39. instant messaging (IM)
  40. distributed denial of service (DDoS)
  41. near field communications (NFC)
  42. proxy
  43. multifactor authentication
  44. e-marketplace
  45. telepresence
  46. consumer to consumer (C2C)
  47. usability
  48. presence awareness
  49. sequential website architecture
  50. expert system
  51. clickstream data
  52. intellectual property
  53. e-commerce
  54. payment gateway
  55. optimization
  56. mashup
  57. neural network
  58. top-level domain
  59. business to business (B2B)
  60. SMTP server
  61. infomediary
  62. botnets
  63. web feed
  64. IMAP (Internet mail access protocol)
  65. text mining
  66. risk matrix
  67. group decision support system (GDSS)
  68. uniform resource locator (URL)
  69. shared workspace
  70. encryption
  71. virtual reality
  72. goal seeking
  73. forecasting
  74. microblogging
  75. click-through rate (CTR)
  76. firewall
  77. hypertext markup language (HTML)
  78. public key encryption
  79. mobile commerce (m-commerce)
  80. crowdsourcing
  81. online analytical processing (OLAP)
  82. digital rights management (DRM)
  83. cookie
  84. what-if analysis
  85. file transfer protocol (ftp://)
  86. shopping cart software
  87. hierarchical website architecture
  88. incidence response plan
  89. cascading style sheets (CSS)
  90. market basket analysis
  91. information security
  92. malware
  93. hastag
  94. content management system