virtual world wiki artificial intelligence (AI) botnets clickstream data SMTP server risk matrix hastag near field communications (NFC) web accessibility stickness presence awareness utilitarianism information security online analytical processing (OLAP) JavaScript market basket analysis single sign-on cascading style sheets (CSS) mashup infomediary tag cloud usability Internet Corporation for Assigned Names and Numbers (ICANN) assistive technologies third- party cookies information privacy AJAX goal seeking consumer to consumer (C2C) consumer to business (C2B) forecasting search engine optimization (SEO) CAPTCHA hierarchical website architecture intelligent agents IMAP (Internet mail access protocol) microformats payment gateway neural network digital rights management (DRM) firewall uniform resource locator (URL) click- through rate (CTR) public key encryption portal text mining shopping cart software web feed dashboard e- commerce hypertext transfer protocol (http://) business to business (B2B) content management system phishing business to consumer (B2C) shared workspace blog multidimensional website architecture distributed denial of service (DDoS) optimization virtual reality war room keyperformance indicators (KPIs) unified communications (UC) predictive analytics ethics web conferencing hypertext markup language (HTML) natural laws and rights social engineering World Wide Web Consortium (W3C) Domain Name System (DNS) microblogging media richness file transfer protocol (ftp://) expert system incidence response plan group decision support system (GDSS) malware encryption intellectual property web browser e- marketplace instant messaging (IM) top- level domain proxy telepresence crowdsourcing cookie what-if analysis multifactor authentication mobile commerce (m- commerce) sequential website architecture virtual world wiki artificial intelligence (AI) botnets clickstream data SMTP server risk matrix hastag near field communications (NFC) web accessibility stickness presence awareness utilitarianism information security online analytical processing (OLAP) JavaScript market basket analysis single sign-on cascading style sheets (CSS) mashup infomediary tag cloud usability Internet Corporation for Assigned Names and Numbers (ICANN) assistive technologies third- party cookies information privacy AJAX goal seeking consumer to consumer (C2C) consumer to business (C2B) forecasting search engine optimization (SEO) CAPTCHA hierarchical website architecture intelligent agents IMAP (Internet mail access protocol) microformats payment gateway neural network digital rights management (DRM) firewall uniform resource locator (URL) click- through rate (CTR) public key encryption portal text mining shopping cart software web feed dashboard e- commerce hypertext transfer protocol (http://) business to business (B2B) content management system phishing business to consumer (B2C) shared workspace blog multidimensional website architecture distributed denial of service (DDoS) optimization virtual reality war room keyperformance indicators (KPIs) unified communications (UC) predictive analytics ethics web conferencing hypertext markup language (HTML) natural laws and rights social engineering World Wide Web Consortium (W3C) Domain Name System (DNS) microblogging media richness file transfer protocol (ftp://) expert system incidence response plan group decision support system (GDSS) malware encryption intellectual property web browser e- marketplace instant messaging (IM) top- level domain proxy telepresence crowdsourcing cookie what-if analysis multifactor authentication mobile commerce (m- commerce) sequential website architecture
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
virtual world
wiki
artificial intelligence (AI)
botnets
clickstream data
SMTP server
risk matrix
hastag
near field communications (NFC)
web accessibility
stickness
presence awareness
utilitarianism
information security
online analytical processing (OLAP)
JavaScript
market basket analysis
single sign-on
cascading style sheets (CSS)
mashup
infomediary
tag cloud
usability
Internet Corporation for Assigned Names and Numbers (ICANN)
assistive technologies
third-party cookies
information privacy
AJAX
goal seeking
consumer to consumer (C2C)
consumer to business (C2B)
forecasting
search engine optimization (SEO)
CAPTCHA
hierarchical website architecture
intelligent agents
IMAP (Internet mail access protocol)
microformats
payment gateway
neural network
digital rights management (DRM)
firewall
uniform resource locator (URL)
click-through rate (CTR)
public key encryption
portal
text mining
shopping cart software
web feed
dashboard
e-commerce
hypertext transfer protocol (http://)
business to business (B2B)
content management system
phishing
business to consumer (B2C)
shared workspace
blog
multidimensional website architecture
distributed denial of service (DDoS)
optimization
virtual reality
war room
keyperformance indicators (KPIs)
unified communications (UC)
predictive analytics
ethics
web conferencing
hypertext markup language (HTML)
natural laws and rights
social engineering
World Wide Web Consortium (W3C)
Domain Name System (DNS)
microblogging
media richness
file transfer protocol (ftp://)
expert system
incidence response plan
group decision support system (GDSS)
malware
encryption
intellectual property
web browser
e-marketplace
instant messaging (IM)
top-level domain
proxy
telepresence
crowdsourcing
cookie
what-if analysis
multifactor authentication
mobile commerce (m-commerce)
sequential website architecture