TrojanHorseRemoteworkingStakeholdersEmailSocialEngineeringCloudcomputingAd HocNetworkFirewallDisruption DowntimePubliccommunicationScalabilityIndustrialespionage CloudstorageInfrastructureDisasterrecovery PharmingDevicehardeningBandwidthWorking24/7/365RansomwareTetheringRuralPersonalHotspotTraditionalcomputingTwo factorauthenticationInternalthreatsBackupandrecoveryAntivirussoftwareDenialofserviceOpenWifiNetworkAccessRightsBiometricsTrojanHorseRemoteworkingStakeholdersEmailSocialEngineeringCloudcomputingAd HocNetworkFirewallDisruption DowntimePubliccommunicationScalabilityIndustrialespionage CloudstorageInfrastructureDisasterrecovery PharmingDevicehardeningBandwidthWorking24/7/365RansomwareTetheringRuralPersonalHotspotTraditionalcomputingTwo factorauthenticationInternalthreatsBackupandrecoveryAntivirussoftwareDenialofserviceOpenWifiNetworkAccessRightsBiometrics

Digital Information Technology - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
  1. Trojan Horse
  2. Remote working
  3. Stakeholders
  4. Email
  5. Social Engineering
  6. Cloud computing
  7. Ad Hoc Network
  8. Firewall
  9. Disruption
  10. Downtime
  11. Public communication
  12. Scalability
  13. Industrial espionage
  14. Cloud storage
  15. Infrastructure
  16. Disaster recovery
  17. Pharming
  18. Device hardening
  19. Bandwidth
  20. Working 24/7/365
  21. Ransomware
  22. Tethering
  23. Rural
  24. Personal Hotspot
  25. Traditional computing
  26. Two factor authentication
  27. Internal threats
  28. Backup and recovery
  29. Anti virus software
  30. Denial of service
  31. Open Wifi Network
  32. Access Rights
  33. Biometrics