Deletion Information Reliance on the Internet Disk drives Potential Loss of Privacy Cyber Security Malicious Insiders Faulty disks Loss of Data Session Hijacking System crashes Data Data lost Accidentally Malicious Hard disk crashes Acts of terrorism Accidental Denial of Service Computer viruses Service Reliability Hacking Data Control Cybercrime Deletion Information Reliance on the Internet Disk drives Potential Loss of Privacy Cyber Security Malicious Insiders Faulty disks Loss of Data Session Hijacking System crashes Data Data lost Accidentally Malicious Hard disk crashes Acts of terrorism Accidental Denial of Service Computer viruses Service Reliability Hacking Data Control Cybercrime
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
B-Deletion
N-Information
G-Reliance on the Internet
G-Disk drives
I-Potential Loss of Privacy
O-Cyber
Security
N-Malicious Insiders
N-Faulty disks
G-Loss of Data
I-Session Hijacking
O-System crashes
B-Data
O-Data lost
B-Accidentally
O-Malicious
B-Hard disk crashes
I-Acts of terrorism
G-Accidental
B-Denial of Service
I-Computer viruses
N-Service Reliability
I-Hacking
O-Data Control
G-Cybercrime