Hypervisor DDoS Big Data Podcast SPAM Ajax RAM Benchmarking Malware Whitelist DLP Crowdsourcing ERP LogRhythm Protocol Snort Cache BYOD Android Virtualization Data Mining Two Factor Nerd Web 2.0 Zipping Webtops Safari Webinar Scareware Host Ultrabook Telepresence Safe Harbor De- duping API SLA Cloud Single Sign On Warm Boot Bloatware SolarWinds Sniffer Trojan B to C Core Dump Filezilla SaaS 4G Murfing Black Tuesday Pentium Fuzzy Logic Hashing Jailbreak Honeypot Wipe ITIL B to B iOS CRM WiFi Workflow Tweet QR Code Firewall Bit Open Source Softphone Viral Blog Chrome Blacklist Dongle iFrame Byte Cookie Phishing Spoofing Wireshark Azure Wikiality EULA Stress Test SYN Flood Content Management Beta Wiki SEO Cross- platform MetroApp Daisy Chain Tagging Mobile Hypervisor DDoS Big Data Podcast SPAM Ajax RAM Benchmarking Malware Whitelist DLP Crowdsourcing ERP LogRhythm Protocol Snort Cache BYOD Android Virtualization Data Mining Two Factor Nerd Web 2.0 Zipping Webtops Safari Webinar Scareware Host Ultrabook Telepresence Safe Harbor De- duping API SLA Cloud Single Sign On Warm Boot Bloatware SolarWinds Sniffer Trojan B to C Core Dump Filezilla SaaS 4G Murfing Black Tuesday Pentium Fuzzy Logic Hashing Jailbreak Honeypot Wipe ITIL B to B iOS CRM WiFi Workflow Tweet QR Code Firewall Bit Open Source Softphone Viral Blog Chrome Blacklist Dongle iFrame Byte Cookie Phishing Spoofing Wireshark Azure Wikiality EULA Stress Test SYN Flood Content Management Beta Wiki SEO Cross- platform MetroApp Daisy Chain Tagging Mobile
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Hypervisor
DDoS
Big Data
Podcast
SPAM
Ajax
RAM
Benchmarking
Malware
Whitelist
DLP
Crowdsourcing
ERP
LogRhythm
Protocol
Snort
Cache
BYOD
Android
Virtualization
Data Mining
Two Factor
Nerd
Web 2.0
Zipping
Webtops
Safari
Webinar
Scareware
Host
Ultrabook
Telepresence
Safe Harbor
De-duping
API
SLA
Cloud
Single Sign On
Warm Boot
Bloatware
SolarWinds
Sniffer
Trojan
B to C
Core Dump
Filezilla
SaaS
4G
Murfing
Black Tuesday
Pentium
Fuzzy Logic
Hashing
Jailbreak
Honeypot
Wipe
ITIL
B to B
iOS
CRM
WiFi
Workflow
Tweet
QR Code
Firewall
Bit
Open Source
Softphone
Viral
Blog
Chrome
Blacklist
Dongle
iFrame
Byte
Cookie
Phishing
Spoofing
Wireshark
Azure
Wikiality
EULA
Stress Test
SYN Flood
Content Management
Beta
Wiki
SEO
Cross-platform
MetroApp
Daisy Chain
Tagging
Mobile