Loss of Data Data Session Hijacking Data lost Accidental Potential Loss of Privacy Information Hard disk crashes Acts of terrorism Accidentally Denial of Service Deletion Malicious Faulty disks Disk drives Cybercrime Data Control Cyber Security Hacking System crashes Service Reliability Computer viruses Malicious Insiders Reliance on the Internet Loss of Data Data Session Hijacking Data lost Accidental Potential Loss of Privacy Information Hard disk crashes Acts of terrorism Accidentally Denial of Service Deletion Malicious Faulty disks Disk drives Cybercrime Data Control Cyber Security Hacking System crashes Service Reliability Computer viruses Malicious Insiders Reliance on the Internet
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
G-Loss of Data
B-Data
I-Session Hijacking
O-Data lost
G-Accidental
I-Potential Loss of Privacy
N-Information
B-Hard disk crashes
I-Acts of terrorism
B-Accidentally
B-Denial of Service
B-Deletion
O-Malicious
N-Faulty disks
G-Disk drives
G-Cybercrime
O-Data Control
O-Cyber
Security
I-Hacking
O-System crashes
N-Service Reliability
I-Computer viruses
N-Malicious Insiders
G-Reliance on the Internet