ScalabilityBackupandrecoveryOpenWifiNetworkRuralDevicehardeningAccessRightsCloudstorageTwo factorauthenticationTraditionalcomputingBandwidthAd HocNetworkAntivirussoftwarePersonalHotspotInfrastructureWorking24/7/365SocialEngineeringDisasterrecovery Disruption Industrialespionage PubliccommunicationBiometricsCloudcomputingDenialofserviceEmailInternalthreatsFirewallRansomwareTetheringRemoteworkingDowntimeTrojanHorsePharmingStakeholdersScalabilityBackupandrecoveryOpenWifiNetworkRuralDevicehardeningAccessRightsCloudstorageTwo factorauthenticationTraditionalcomputingBandwidthAd HocNetworkAntivirussoftwarePersonalHotspotInfrastructureWorking24/7/365SocialEngineeringDisasterrecovery Disruption Industrialespionage PubliccommunicationBiometricsCloudcomputingDenialofserviceEmailInternalthreatsFirewallRansomwareTetheringRemoteworkingDowntimeTrojanHorsePharmingStakeholders

Digital Information Technology - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
  1. Scalability
  2. Backup and recovery
  3. Open Wifi Network
  4. Rural
  5. Device hardening
  6. Access Rights
  7. Cloud storage
  8. Two factor authentication
  9. Traditional computing
  10. Bandwidth
  11. Ad Hoc Network
  12. Anti virus software
  13. Personal Hotspot
  14. Infrastructure
  15. Working 24/7/365
  16. Social Engineering
  17. Disaster recovery
  18. Disruption
  19. Industrial espionage
  20. Public communication
  21. Biometrics
  22. Cloud computing
  23. Denial of service
  24. Email
  25. Internal threats
  26. Firewall
  27. Ransomware
  28. Tethering
  29. Remote working
  30. Downtime
  31. Trojan Horse
  32. Pharming
  33. Stakeholders