ScalabilityDisasterrecovery Ad HocNetworkFirewallEmailRansomwareDisruption RemoteworkingTrojanHorseBiometricsTetheringDevicehardeningCloudcomputingSocialEngineeringTraditionalcomputingTwo factorauthenticationRuralPharmingCloudstorageIndustrialespionage StakeholdersDenialofserviceInternalthreatsBackupandrecoveryBandwidthInfrastructureAntivirussoftwareDowntimePersonalHotspotOpenWifiNetworkAccessRightsWorking24/7/365PubliccommunicationScalabilityDisasterrecovery Ad HocNetworkFirewallEmailRansomwareDisruption RemoteworkingTrojanHorseBiometricsTetheringDevicehardeningCloudcomputingSocialEngineeringTraditionalcomputingTwo factorauthenticationRuralPharmingCloudstorageIndustrialespionage StakeholdersDenialofserviceInternalthreatsBackupandrecoveryBandwidthInfrastructureAntivirussoftwareDowntimePersonalHotspotOpenWifiNetworkAccessRightsWorking24/7/365Publiccommunication

Digital Information Technology - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
  1. Scalability
  2. Disaster recovery
  3. Ad Hoc Network
  4. Firewall
  5. Email
  6. Ransomware
  7. Disruption
  8. Remote working
  9. Trojan Horse
  10. Biometrics
  11. Tethering
  12. Device hardening
  13. Cloud computing
  14. Social Engineering
  15. Traditional computing
  16. Two factor authentication
  17. Rural
  18. Pharming
  19. Cloud storage
  20. Industrial espionage
  21. Stakeholders
  22. Denial of service
  23. Internal threats
  24. Backup and recovery
  25. Bandwidth
  26. Infrastructure
  27. Anti virus software
  28. Downtime
  29. Personal Hotspot
  30. Open Wifi Network
  31. Access Rights
  32. Working 24/7/365
  33. Public communication