wormrouterlogfilesROMInternetTelephonyRAMantivirusvirusTrojanHorseemailforumsfirewallnormspywarelogImageSharingInternetRelayChatStreamingMediaServicebackdoorprotocolShortMessageServiceFileTransferProtocolserverWannCryVirusmailinglistwormrouterlogfilesROMInternetTelephonyRAMantivirusvirusTrojanHorseemailforumsfirewallnormspywarelogImageSharingInternetRelayChatStreamingMediaServicebackdoorprotocolShortMessageServiceFileTransferProtocolserverWannCryVirusmailinglist

Cyber Vocabulary Review Unit 1-2 - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
I
3
G
4
N
5
N
6
G
7
G
8
B
9
O
10
G
11
O
12
I
13
O
14
G
15
N
16
B
17
B
18
I
19
N
20
B
21
O
22
N
23
B
24
O
25
I
  1. I-worm
  2. I-router
  3. G-logfiles
  4. N-ROM
  5. N-Internet Telephony
  6. G-RAM
  7. G-antivirus
  8. B-virus
  9. O-Trojan Horse
  10. G-email
  11. O-forums
  12. I-firewall
  13. O-norm
  14. G-spyware
  15. N-log
  16. B-Image Sharing
  17. B-Internet Relay Chat
  18. I-Streaming Media Service
  19. N-backdoor
  20. B-protocol
  21. O-Short Message Service
  22. N-File Transfer Protocol
  23. B-server
  24. O-Wann Cry Virus
  25. I-mailing list