InternalthreatsDowntimeScalabilityAd HocNetworkBandwidthTraditionalcomputingWorking24/7/365RansomwareCloudcomputingEmailBackupandrecoverySocialEngineeringAccessRightsTwo factorauthenticationAntivirussoftwareDisasterrecovery StakeholdersTrojanHorseIndustrialespionage PersonalHotspotPubliccommunicationDenialofserviceOpenWifiNetworkRemoteworkingRuralCloudstorageBiometricsDevicehardeningPharmingInfrastructureFirewallTetheringDisruption InternalthreatsDowntimeScalabilityAd HocNetworkBandwidthTraditionalcomputingWorking24/7/365RansomwareCloudcomputingEmailBackupandrecoverySocialEngineeringAccessRightsTwo factorauthenticationAntivirussoftwareDisasterrecovery StakeholdersTrojanHorseIndustrialespionage PersonalHotspotPubliccommunicationDenialofserviceOpenWifiNetworkRemoteworkingRuralCloudstorageBiometricsDevicehardeningPharmingInfrastructureFirewallTetheringDisruption 

Digital Information Technology - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
  1. Internal threats
  2. Downtime
  3. Scalability
  4. Ad Hoc Network
  5. Bandwidth
  6. Traditional computing
  7. Working 24/7/365
  8. Ransomware
  9. Cloud computing
  10. Email
  11. Backup and recovery
  12. Social Engineering
  13. Access Rights
  14. Two factor authentication
  15. Anti virus software
  16. Disaster recovery
  17. Stakeholders
  18. Trojan Horse
  19. Industrial espionage
  20. Personal Hotspot
  21. Public communication
  22. Denial of service
  23. Open Wifi Network
  24. Remote working
  25. Rural
  26. Cloud storage
  27. Biometrics
  28. Device hardening
  29. Pharming
  30. Infrastructure
  31. Firewall
  32. Tethering
  33. Disruption