AcomputingsystemDigitalDivideIP(InternetProtocol)PacketSamplingFaultToleranceRoutingPersonallyIdentifiableInformation(PII)InternetComputingInnovationRouterPublic KeyEncryptionBandwidthSamplingRatePathAntivirusSoftwareLosslessCompressionTheCloudRougeAccessPointMalwareISPWorldWideWebFreeSoftwareProtocolFirewallBinarySequenceFloatingPointWidthPhishingKeyloggingSoftwareAcomputingdeviceRedundancyPacketSwitchingCitizenScienceCreativeCommonsCrowdsourcingIPAddressDDoS Attack(DistributedDenial ofService)ScalabilityByteOpenSourceOpenAccessSSL/TLS(securesocketslayer/transportlayer security)SymmetricEncryptionAcomputernetworkWordComputerVirusAnalogTCP(TransmissionControlProtocol)DecryptionCertificateAuthoritiesEncryptionLossyCompressionAcomputingsystemDigitalDivideIP(InternetProtocol)PacketSamplingFaultToleranceRoutingPersonallyIdentifiableInformation(PII)InternetComputingInnovationRouterPublic KeyEncryptionBandwidthSamplingRatePathAntivirusSoftwareLosslessCompressionTheCloudRougeAccessPointMalwareISPWorldWideWebFreeSoftwareProtocolFirewallBinarySequenceFloatingPointWidthPhishingKeyloggingSoftwareAcomputingdeviceRedundancyPacketSwitchingCitizenScienceCreativeCommonsCrowdsourcingIPAddressDDoS Attack(DistributedDenial ofService)ScalabilityByteOpenSourceOpenAccessSSL/TLS(securesocketslayer/transportlayer security)SymmetricEncryptionAcomputernetworkWordComputerVirusAnalogTCP(TransmissionControlProtocol)DecryptionCertificateAuthoritiesEncryptionLossyCompression

Unit 4 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
  1. A computing system
  2. Digital Divide
  3. IP (Internet Protocol)
  4. Packet
  5. Sampling
  6. Fault Tolerance
  7. Routing
  8. Personally Identifiable Information (PII)
  9. Internet
  10. Computing Innovation
  11. Router
  12. Public Key Encryption
  13. Bandwidth
  14. Sampling Rate
  15. Path
  16. Antivirus Software
  17. Lossless Compression
  18. The Cloud
  19. Rouge Access Point
  20. Malware
  21. ISP
  22. World Wide Web
  23. Free Software
  24. Protocol
  25. Firewall
  26. Binary Sequence
  27. Floating Point
  28. Width
  29. Phishing
  30. Keylogging Software
  31. A computing device
  32. Redundancy
  33. Packet Switching
  34. Citizen Science
  35. Creative Commons
  36. Crowdsourcing
  37. IP Address
  38. DDoS Attack (Distributed Denial of Service)
  39. Scalability
  40. Byte
  41. Open Source
  42. Open Access
  43. SSL/TLS (secure sockets layer/transport layer security)
  44. Symmetric Encryption
  45. A computer network
  46. Word
  47. Computer Virus
  48. Analog
  49. TCP (Transmission Control Protocol)
  50. Decryption
  51. Certificate Authorities
  52. Encryption
  53. Lossy Compression