hastagWorld WideWebConsortium(W3C)sticknessincidenceresponseplanInternetCorporation forAssignedNames andNumbers(ICANN)IMAP(Internet mailaccessprotocol)hypertexttransferprotocol(http://)encryptionAJAXfiletransferprotocol(ftp://)near fieldcommunications(NFC)uniformresourcelocator(URL)unifiedcommunications(UC)what-ifanalysisconsumertobusiness(C2B)hierarchicalwebsitearchitectureethicsinstantmessaging(IM)DomainNameSystem(DNS)consumertoconsumer(C2C)intellectualpropertybusinesstoconsumer(B2C)paymentgatewaysearchengineoptimization(SEO)digital rightsmanagement(DRM)tagcloudintelligentagentsmicroformatsassistivetechnologiesnaturallaws andrightsusabilitygoalseekingwebfeedcascadingstylesheets(CSS)virtualrealitywikimalwaremultidimensionalwebsitearchitecturesinglesign-onmicrobloggingmediarichnessbusinesstobusiness(B2B)third-partycookiessequentialwebsitearchitecturee-commercemobilecommerce(m-commerce)artificialintelligence(AI)distributeddenial ofservice(DDoS)optimizationsharedworkspaceutilitarianismportalmarketbasketanalysisblogwebconferencinginfomediarymultifactorauthenticationcontentmanagementsystemfirewallexpertsystemtop-leveldomaingroupdecisionsupportsystem(GDSS)webbrowserphishingsocialengineeringriskmatrixJavaScripttextminingpresenceawarenessproxycookieonlineanalyticalprocessing(OLAP)click-throughrate(CTR)dashboardinformationsecurityshoppingcartsoftwarecrowdsourcinge-marketplaceclickstreamdatawarroommashupneuralnetworkCAPTCHAwebaccessibilitytelepresencepredictiveanalyticsbotnetskeyperformanceindicators (KPIs)SMTPserverpublic keyencryptionvirtualworldhypertextmarkuplanguage(HTML)forecastinginformationprivacyhastagWorld WideWebConsortium(W3C)sticknessincidenceresponseplanInternetCorporation forAssignedNames andNumbers(ICANN)IMAP(Internet mailaccessprotocol)hypertexttransferprotocol(http://)encryptionAJAXfiletransferprotocol(ftp://)near fieldcommunications(NFC)uniformresourcelocator(URL)unifiedcommunications(UC)what-ifanalysisconsumertobusiness(C2B)hierarchicalwebsitearchitectureethicsinstantmessaging(IM)DomainNameSystem(DNS)consumertoconsumer(C2C)intellectualpropertybusinesstoconsumer(B2C)paymentgatewaysearchengineoptimization(SEO)digital rightsmanagement(DRM)tagcloudintelligentagentsmicroformatsassistivetechnologiesnaturallaws andrightsusabilitygoalseekingwebfeedcascadingstylesheets(CSS)virtualrealitywikimalwaremultidimensionalwebsitearchitecturesinglesign-onmicrobloggingmediarichnessbusinesstobusiness(B2B)third-partycookiessequentialwebsitearchitecturee-commercemobilecommerce(m-commerce)artificialintelligence(AI)distributeddenial ofservice(DDoS)optimizationsharedworkspaceutilitarianismportalmarketbasketanalysisblogwebconferencinginfomediarymultifactorauthenticationcontentmanagementsystemfirewallexpertsystemtop-leveldomaingroupdecisionsupportsystem(GDSS)webbrowserphishingsocialengineeringriskmatrixJavaScripttextminingpresenceawarenessproxycookieonlineanalyticalprocessing(OLAP)click-throughrate(CTR)dashboardinformationsecurityshoppingcartsoftwarecrowdsourcinge-marketplaceclickstreamdatawarroommashupneuralnetworkCAPTCHAwebaccessibilitytelepresencepredictiveanalyticsbotnetskeyperformanceindicators (KPIs)SMTPserverpublic keyencryptionvirtualworldhypertextmarkuplanguage(HTML)forecastinginformationprivacy

Information Technology Terms Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
  1. hastag
  2. World Wide Web Consortium (W3C)
  3. stickness
  4. incidence response plan
  5. Internet Corporation for Assigned Names and Numbers (ICANN)
  6. IMAP (Internet mail access protocol)
  7. hypertext transfer protocol (http://)
  8. encryption
  9. AJAX
  10. file transfer protocol (ftp://)
  11. near field communications (NFC)
  12. uniform resource locator (URL)
  13. unified communications (UC)
  14. what-if analysis
  15. consumer to business (C2B)
  16. hierarchical website architecture
  17. ethics
  18. instant messaging (IM)
  19. Domain Name System (DNS)
  20. consumer to consumer (C2C)
  21. intellectual property
  22. business to consumer (B2C)
  23. payment gateway
  24. search engine optimization (SEO)
  25. digital rights management (DRM)
  26. tag cloud
  27. intelligent agents
  28. microformats
  29. assistive technologies
  30. natural laws and rights
  31. usability
  32. goal seeking
  33. web feed
  34. cascading style sheets (CSS)
  35. virtual reality
  36. wiki
  37. malware
  38. multidimensional website architecture
  39. single sign-on
  40. microblogging
  41. media richness
  42. business to business (B2B)
  43. third-party cookies
  44. sequential website architecture
  45. e-commerce
  46. mobile commerce (m-commerce)
  47. artificial intelligence (AI)
  48. distributed denial of service (DDoS)
  49. optimization
  50. shared workspace
  51. utilitarianism
  52. portal
  53. market basket analysis
  54. blog
  55. web conferencing
  56. infomediary
  57. multifactor authentication
  58. content management system
  59. firewall
  60. expert system
  61. top-level domain
  62. group decision support system (GDSS)
  63. web browser
  64. phishing
  65. social engineering
  66. risk matrix
  67. JavaScript
  68. text mining
  69. presence awareness
  70. proxy
  71. cookie
  72. online analytical processing (OLAP)
  73. click-through rate (CTR)
  74. dashboard
  75. information security
  76. shopping cart software
  77. crowdsourcing
  78. e-marketplace
  79. clickstream data
  80. war room
  81. mashup
  82. neural network
  83. CAPTCHA
  84. web accessibility
  85. telepresence
  86. predictive analytics
  87. botnets
  88. keyperformance indicators (KPIs)
  89. SMTP server
  90. public key encryption
  91. virtual world
  92. hypertext markup language (HTML)
  93. forecasting
  94. information privacy