CloudcomputingRemoteworkingPersonalHotspotAd HocNetworkDowntimeScalabilityFirewallTrojanHorseTetheringDisruption OpenWifiNetworkAntivirussoftwareCloudstoragePubliccommunicationBiometricsStakeholdersTwo factorauthenticationInternalthreatsTraditionalcomputingDisasterrecovery RansomwareDenialofserviceEmailDevicehardeningIndustrialespionage InfrastructureBandwidthWorking24/7/365BackupandrecoverySocialEngineeringPharmingAccessRightsRuralCloudcomputingRemoteworkingPersonalHotspotAd HocNetworkDowntimeScalabilityFirewallTrojanHorseTetheringDisruption OpenWifiNetworkAntivirussoftwareCloudstoragePubliccommunicationBiometricsStakeholdersTwo factorauthenticationInternalthreatsTraditionalcomputingDisasterrecovery RansomwareDenialofserviceEmailDevicehardeningIndustrialespionage InfrastructureBandwidthWorking24/7/365BackupandrecoverySocialEngineeringPharmingAccessRightsRural

Digital Information Technology - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
  1. Cloud computing
  2. Remote working
  3. Personal Hotspot
  4. Ad Hoc Network
  5. Downtime
  6. Scalability
  7. Firewall
  8. Trojan Horse
  9. Tethering
  10. Disruption
  11. Open Wifi Network
  12. Anti virus software
  13. Cloud storage
  14. Public communication
  15. Biometrics
  16. Stakeholders
  17. Two factor authentication
  18. Internal threats
  19. Traditional computing
  20. Disaster recovery
  21. Ransomware
  22. Denial of service
  23. Email
  24. Device hardening
  25. Industrial espionage
  26. Infrastructure
  27. Bandwidth
  28. Working 24/7/365
  29. Backup and recovery
  30. Social Engineering
  31. Pharming
  32. Access Rights
  33. Rural