Hacking System crashes Data Control Session Hijacking Disk drives Reliance on the Internet Information Malicious Accidental Denial of Service Acts of terrorism Computer viruses Deletion Potential Loss of Privacy Data lost Cyber Security Hard disk crashes Cybercrime Data Loss of Data Accidentally Malicious Insiders Service Reliability Faulty disks Hacking System crashes Data Control Session Hijacking Disk drives Reliance on the Internet Information Malicious Accidental Denial of Service Acts of terrorism Computer viruses Deletion Potential Loss of Privacy Data lost Cyber Security Hard disk crashes Cybercrime Data Loss of Data Accidentally Malicious Insiders Service Reliability Faulty disks
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
I-Hacking
O-System crashes
O-Data Control
I-Session Hijacking
G-Disk drives
G-Reliance on the Internet
N-Information
O-Malicious
G-Accidental
B-Denial of Service
I-Acts of terrorism
I-Computer viruses
B-Deletion
I-Potential Loss of Privacy
O-Data lost
O-Cyber
Security
B-Hard disk crashes
G-Cybercrime
B-Data
G-Loss of Data
B-Accidentally
N-Malicious Insiders
N-Service Reliability
N-Faulty disks