Cloud computing Remote working Personal Hotspot Ad Hoc Network Downtime Scalability Firewall Trojan Horse Tethering Disruption Open Wifi Network Anti virus software Cloud storage Public communication Biometrics Stakeholders Two factor authentication Internal threats Traditional computing Disaster recovery Ransomware Denial of service Email Device hardening Industrial espionage Infrastructure Bandwidth Working 24/7/365 Backup and recovery Social Engineering Pharming Access Rights Rural Cloud computing Remote working Personal Hotspot Ad Hoc Network Downtime Scalability Firewall Trojan Horse Tethering Disruption Open Wifi Network Anti virus software Cloud storage Public communication Biometrics Stakeholders Two factor authentication Internal threats Traditional computing Disaster recovery Ransomware Denial of service Email Device hardening Industrial espionage Infrastructure Bandwidth Working 24/7/365 Backup and recovery Social Engineering Pharming Access Rights Rural
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cloud computing
Remote working
Personal Hotspot
Ad Hoc Network
Downtime
Scalability
Firewall
Trojan Horse
Tethering
Disruption
Open Wifi Network
Anti virus software
Cloud storage
Public communication
Biometrics
Stakeholders
Two factor authentication
Internal threats
Traditional computing
Disaster recovery
Ransomware
Denial of service
Email
Device hardening
Industrial espionage
Infrastructure
Bandwidth
Working 24/7/365
Backup and recovery
Social Engineering
Pharming
Access Rights
Rural