BiometricsDenialofserviceDowntimeTrojanHorseInfrastructureSocialEngineeringOpenWifiNetworkTetheringDisasterrecovery FirewallAd HocNetworkCloudcomputingPersonalHotspotAntivirussoftwareInternalthreatsScalabilityRuralPharmingBackupandrecoveryDisruption Two factorauthenticationPubliccommunicationTraditionalcomputingWorking24/7/365AccessRightsRemoteworkingBandwidthDevicehardeningIndustrialespionage CloudstorageStakeholdersRansomwareEmailBiometricsDenialofserviceDowntimeTrojanHorseInfrastructureSocialEngineeringOpenWifiNetworkTetheringDisasterrecovery FirewallAd HocNetworkCloudcomputingPersonalHotspotAntivirussoftwareInternalthreatsScalabilityRuralPharmingBackupandrecoveryDisruption Two factorauthenticationPubliccommunicationTraditionalcomputingWorking24/7/365AccessRightsRemoteworkingBandwidthDevicehardeningIndustrialespionage CloudstorageStakeholdersRansomwareEmail

Digital Information Technology - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
  1. Biometrics
  2. Denial of service
  3. Downtime
  4. Trojan Horse
  5. Infrastructure
  6. Social Engineering
  7. Open Wifi Network
  8. Tethering
  9. Disaster recovery
  10. Firewall
  11. Ad Hoc Network
  12. Cloud computing
  13. Personal Hotspot
  14. Anti virus software
  15. Internal threats
  16. Scalability
  17. Rural
  18. Pharming
  19. Backup and recovery
  20. Disruption
  21. Two factor authentication
  22. Public communication
  23. Traditional computing
  24. Working 24/7/365
  25. Access Rights
  26. Remote working
  27. Bandwidth
  28. Device hardening
  29. Industrial espionage
  30. Cloud storage
  31. Stakeholders
  32. Ransomware
  33. Email