clickstreamdatawhat-ifanalysisincidenceresponseplanphishingsharedworkspacemultidimensionalwebsitearchitecturetelepresenceconsumertobusiness(C2B)hypertextmarkuplanguage(HTML)tagcloudinstantmessaging(IM)mobilecommerce(m-commerce)e-marketplacewebfeedwebaccessibilityclick-throughrate(CTR)marketbasketanalysisinformationprivacyneuralnetworkmalwarebotnetssocialengineeringcontentmanagementsystemvirtualrealityunifiedcommunications(UC)predictiveanalyticsdistributeddenial ofservice(DDoS)digital rightsmanagement(DRM)CAPTCHAe-commercehastagfiletransferprotocol(ftp://)expertsystempaymentgatewayonlineanalyticalprocessing(OLAP)uniformresourcelocator(URL)JavaScriptartificialintelligence(AI)IMAP(Internet mailaccessprotocol)presenceawarenesswarroomDomainNameSystem(DNS)InternetCorporation forAssignedNames andNumbers(ICANN)cookieethicsportalwikifirewallwebbrowsermediarichnesscascadingstylesheets(CSS)AJAXmultifactorauthenticationthird-partycookiesinformationsecurityassistivetechnologiesbusinesstoconsumer(B2C)intellectualpropertyhierarchicalwebsitearchitectureusabilitygoalseekingtop-leveldomainsinglesign-ontextminingbusinesstobusiness(B2B)SMTPserverdashboardnaturallaws andrightskeyperformanceindicators (KPIs)public keyencryptioncrowdsourcingwebconferencingsearchengineoptimization(SEO)forecastingproxyinfomediaryutilitarianismgroupdecisionsupportsystem(GDSS)mashupmicroformatsoptimizationhypertexttransferprotocol(http://)near fieldcommunications(NFC)sequentialwebsitearchitecturesticknessshoppingcartsoftwareriskmatrixconsumertoconsumer(C2C)blogencryptionvirtualworldintelligentagentsWorld WideWebConsortium(W3C)microbloggingclickstreamdatawhat-ifanalysisincidenceresponseplanphishingsharedworkspacemultidimensionalwebsitearchitecturetelepresenceconsumertobusiness(C2B)hypertextmarkuplanguage(HTML)tagcloudinstantmessaging(IM)mobilecommerce(m-commerce)e-marketplacewebfeedwebaccessibilityclick-throughrate(CTR)marketbasketanalysisinformationprivacyneuralnetworkmalwarebotnetssocialengineeringcontentmanagementsystemvirtualrealityunifiedcommunications(UC)predictiveanalyticsdistributeddenial ofservice(DDoS)digital rightsmanagement(DRM)CAPTCHAe-commercehastagfiletransferprotocol(ftp://)expertsystempaymentgatewayonlineanalyticalprocessing(OLAP)uniformresourcelocator(URL)JavaScriptartificialintelligence(AI)IMAP(Internet mailaccessprotocol)presenceawarenesswarroomDomainNameSystem(DNS)InternetCorporation forAssignedNames andNumbers(ICANN)cookieethicsportalwikifirewallwebbrowsermediarichnesscascadingstylesheets(CSS)AJAXmultifactorauthenticationthird-partycookiesinformationsecurityassistivetechnologiesbusinesstoconsumer(B2C)intellectualpropertyhierarchicalwebsitearchitectureusabilitygoalseekingtop-leveldomainsinglesign-ontextminingbusinesstobusiness(B2B)SMTPserverdashboardnaturallaws andrightskeyperformanceindicators (KPIs)public keyencryptioncrowdsourcingwebconferencingsearchengineoptimization(SEO)forecastingproxyinfomediaryutilitarianismgroupdecisionsupportsystem(GDSS)mashupmicroformatsoptimizationhypertexttransferprotocol(http://)near fieldcommunications(NFC)sequentialwebsitearchitecturesticknessshoppingcartsoftwareriskmatrixconsumertoconsumer(C2C)blogencryptionvirtualworldintelligentagentsWorld WideWebConsortium(W3C)microblogging

Information Technology Terms Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
  1. clickstream data
  2. what-if analysis
  3. incidence response plan
  4. phishing
  5. shared workspace
  6. multidimensional website architecture
  7. telepresence
  8. consumer to business (C2B)
  9. hypertext markup language (HTML)
  10. tag cloud
  11. instant messaging (IM)
  12. mobile commerce (m-commerce)
  13. e-marketplace
  14. web feed
  15. web accessibility
  16. click-through rate (CTR)
  17. market basket analysis
  18. information privacy
  19. neural network
  20. malware
  21. botnets
  22. social engineering
  23. content management system
  24. virtual reality
  25. unified communications (UC)
  26. predictive analytics
  27. distributed denial of service (DDoS)
  28. digital rights management (DRM)
  29. CAPTCHA
  30. e-commerce
  31. hastag
  32. file transfer protocol (ftp://)
  33. expert system
  34. payment gateway
  35. online analytical processing (OLAP)
  36. uniform resource locator (URL)
  37. JavaScript
  38. artificial intelligence (AI)
  39. IMAP (Internet mail access protocol)
  40. presence awareness
  41. war room
  42. Domain Name System (DNS)
  43. Internet Corporation for Assigned Names and Numbers (ICANN)
  44. cookie
  45. ethics
  46. portal
  47. wiki
  48. firewall
  49. web browser
  50. media richness
  51. cascading style sheets (CSS)
  52. AJAX
  53. multifactor authentication
  54. third-party cookies
  55. information security
  56. assistive technologies
  57. business to consumer (B2C)
  58. intellectual property
  59. hierarchical website architecture
  60. usability
  61. goal seeking
  62. top-level domain
  63. single sign-on
  64. text mining
  65. business to business (B2B)
  66. SMTP server
  67. dashboard
  68. natural laws and rights
  69. keyperformance indicators (KPIs)
  70. public key encryption
  71. crowdsourcing
  72. web conferencing
  73. search engine optimization (SEO)
  74. forecasting
  75. proxy
  76. infomediary
  77. utilitarianism
  78. group decision support system (GDSS)
  79. mashup
  80. microformats
  81. optimization
  82. hypertext transfer protocol (http://)
  83. near field communications (NFC)
  84. sequential website architecture
  85. stickness
  86. shopping cart software
  87. risk matrix
  88. consumer to consumer (C2C)
  89. blog
  90. encryption
  91. virtual world
  92. intelligent agents
  93. World Wide Web Consortium (W3C)
  94. microblogging