MacOSMeltdownattackBruteForceExamples ofUnauthorizedUseCybersecurityAMonitorDarklyARMOpen-SourcemonitorCompilerPeripheralsprocessingAndroidRandomAccessMemory(RAM)WindowsSharewareCentralProcessingUnit (CPU)Machine/ComputerLanguageHuman/ProgrammingLanguageDriverSoftwareiOSmouseProgrammingSoftwareExamplesofAuthorizedUseApplicationSoftwarePowerSupplyLinux,Windows,iOSCircuit(s)BIOS/UEFINetworkAdapterUtilitySoftwareDefaultPasswordSystemSoftwareGraphicsProcessingUnit (GPU)Closed-SourceShortTermstoragex86ColdBootBinaryFreewareOperatingSystem(OS)FirmwareHardDriveDevice(HDD)Motherboard(MoBo)EthicsKeyboardSnifferoutputinputkeyboardAcceptableUse Policy(AUP)MacOSMeltdownattackBruteForceExamples ofUnauthorizedUseCybersecurityAMonitorDarklyARMOpen-SourcemonitorCompilerPeripheralsprocessingAndroidRandomAccessMemory(RAM)WindowsSharewareCentralProcessingUnit (CPU)Machine/ComputerLanguageHuman/ProgrammingLanguageDriverSoftwareiOSmouseProgrammingSoftwareExamplesofAuthorizedUseApplicationSoftwarePowerSupplyLinux,Windows,iOSCircuit(s)BIOS/UEFINetworkAdapterUtilitySoftwareDefaultPasswordSystemSoftwareGraphicsProcessingUnit (GPU)Closed-SourceShortTermstoragex86ColdBootBinaryFreewareOperatingSystem(OS)FirmwareHardDriveDevice(HDD)Motherboard(MoBo)EthicsKeyboardSnifferoutputinputkeyboardAcceptableUse Policy(AUP)

1.1 Foundations of IT Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. MacOS
  2. Meltdown attack
  3. Brute Force
  4. Examples of Unauthorized Use
  5. Cybersecurity
  6. A Monitor Darkly
  7. ARM
  8. Open-Source
  9. monitor
  10. Compiler
  11. Peripherals
  12. processing
  13. Android
  14. Random Access Memory (RAM)
  15. Windows
  16. Shareware
  17. Central Processing Unit (CPU)
  18. Machine/Computer Language
  19. Human/Programming Language
  20. Driver Software
  21. iOS
  22. mouse
  23. Programming Software
  24. Examples of Authorized Use
  25. Application Software
  26. Power Supply
  27. Linux, Windows, iOS
  28. Circuit(s)
  29. BIOS/UEFI
  30. Network Adapter
  31. Utility Software
  32. Default Password
  33. System Software
  34. Graphics Processing Unit (GPU)
  35. Closed-Source
  36. Short Term storage
  37. x86
  38. Cold Boot
  39. Binary
  40. Freeware
  41. Operating System (OS)
  42. Firmware
  43. Hard Drive Device (HDD)
  44. Motherboard (MoBo)
  45. Ethics
  46. Keyboard Sniffer
  47. output
  48. input
  49. keyboard
  50. Acceptable Use Policy (AUP)