Data Information Disk drives Deletion Malicious Accidentally Service Reliability Hard disk crashes System crashes Denial of Service Faulty disks Data Control Loss of Data Accidental Cyber Security Reliance on the Internet Session Hijacking Data lost Potential Loss of Privacy Malicious Insiders Hacking Acts of terrorism Computer viruses Cybercrime Data Information Disk drives Deletion Malicious Accidentally Service Reliability Hard disk crashes System crashes Denial of Service Faulty disks Data Control Loss of Data Accidental Cyber Security Reliance on the Internet Session Hijacking Data lost Potential Loss of Privacy Malicious Insiders Hacking Acts of terrorism Computer viruses Cybercrime
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
B-Data
N-Information
G-Disk drives
B-Deletion
O-Malicious
B-Accidentally
N-Service Reliability
B-Hard disk crashes
O-System crashes
B-Denial of Service
N-Faulty disks
O-Data Control
G-Loss of Data
G-Accidental
O-Cyber
Security
G-Reliance on the Internet
I-Session Hijacking
O-Data lost
I-Potential Loss of Privacy
N-Malicious Insiders
I-Hacking
I-Acts of terrorism
I-Computer viruses
G-Cybercrime