FirewallEmailStakeholdersWorking24/7/365BackupandrecoverySocialEngineeringIndustrialespionage TraditionalcomputingBandwidthDisruption Two factorauthenticationTrojanHorseAd HocNetworkDevicehardeningRemoteworkingRansomwarePersonalHotspotTetheringCloudstorageOpenWifiNetworkBiometricsScalabilityDisasterrecovery AccessRightsPubliccommunicationCloudcomputingDowntimePharmingInternalthreatsInfrastructureAntivirussoftwareRuralDenialofserviceFirewallEmailStakeholdersWorking24/7/365BackupandrecoverySocialEngineeringIndustrialespionage TraditionalcomputingBandwidthDisruption Two factorauthenticationTrojanHorseAd HocNetworkDevicehardeningRemoteworkingRansomwarePersonalHotspotTetheringCloudstorageOpenWifiNetworkBiometricsScalabilityDisasterrecovery AccessRightsPubliccommunicationCloudcomputingDowntimePharmingInternalthreatsInfrastructureAntivirussoftwareRuralDenialofservice

Digital Information Technology - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
  1. Firewall
  2. Email
  3. Stakeholders
  4. Working 24/7/365
  5. Backup and recovery
  6. Social Engineering
  7. Industrial espionage
  8. Traditional computing
  9. Bandwidth
  10. Disruption
  11. Two factor authentication
  12. Trojan Horse
  13. Ad Hoc Network
  14. Device hardening
  15. Remote working
  16. Ransomware
  17. Personal Hotspot
  18. Tethering
  19. Cloud storage
  20. Open Wifi Network
  21. Biometrics
  22. Scalability
  23. Disaster recovery
  24. Access Rights
  25. Public communication
  26. Cloud computing
  27. Downtime
  28. Pharming
  29. Internal threats
  30. Infrastructure
  31. Anti virus software
  32. Rural
  33. Denial of service