TraditionalcomputingDisasterrecovery RuralBiometricsEmailBandwidthDenialofserviceAccessRightsTetheringAntivirussoftwareWorking24/7/365CloudstoragePharmingBackupandrecoveryPubliccommunicationScalabilityCloudcomputingAd HocNetworkFirewallIndustrialespionage DevicehardeningInfrastructureOpenWifiNetworkDowntimeRansomwareDisruption InternalthreatsPersonalHotspotRemoteworkingTwo factorauthenticationTrojanHorseSocialEngineeringStakeholdersTraditionalcomputingDisasterrecovery RuralBiometricsEmailBandwidthDenialofserviceAccessRightsTetheringAntivirussoftwareWorking24/7/365CloudstoragePharmingBackupandrecoveryPubliccommunicationScalabilityCloudcomputingAd HocNetworkFirewallIndustrialespionage DevicehardeningInfrastructureOpenWifiNetworkDowntimeRansomwareDisruption InternalthreatsPersonalHotspotRemoteworkingTwo factorauthenticationTrojanHorseSocialEngineeringStakeholders

Digital Information Technology - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
  1. Traditional computing
  2. Disaster recovery
  3. Rural
  4. Biometrics
  5. Email
  6. Bandwidth
  7. Denial of service
  8. Access Rights
  9. Tethering
  10. Anti virus software
  11. Working 24/7/365
  12. Cloud storage
  13. Pharming
  14. Backup and recovery
  15. Public communication
  16. Scalability
  17. Cloud computing
  18. Ad Hoc Network
  19. Firewall
  20. Industrial espionage
  21. Device hardening
  22. Infrastructure
  23. Open Wifi Network
  24. Downtime
  25. Ransomware
  26. Disruption
  27. Internal threats
  28. Personal Hotspot
  29. Remote working
  30. Two factor authentication
  31. Trojan Horse
  32. Social Engineering
  33. Stakeholders