ISPDigitalDivideCrowdsourcingRedundancySymmetricEncryptionPacketSwitchingRouterDecryptionWordComputingInnovationKeyloggingSoftwareOpenSourceWorldWideWebDDoS Attack(DistributedDenial ofService)IP(InternetProtocol)PersonallyIdentifiableInformation(PII)AcomputernetworkFirewallProtocolCertificateAuthoritiesPublic KeyEncryptionEncryptionAcomputingsystemBandwidthPacketCitizenScienceScalabilitySamplingAntivirusSoftwareComputerVirusByteFloatingPointRoutingTheCloudFreeSoftwareTCP(TransmissionControlProtocol)OpenAccessWidthInternetRougeAccessPointSamplingRateCreativeCommonsSSL/TLS(securesocketslayer/transportlayer security)MalwareIPAddressLosslessCompressionBinarySequencePathFaultToleranceAcomputingdeviceAnalogLossyCompressionPhishingISPDigitalDivideCrowdsourcingRedundancySymmetricEncryptionPacketSwitchingRouterDecryptionWordComputingInnovationKeyloggingSoftwareOpenSourceWorldWideWebDDoS Attack(DistributedDenial ofService)IP(InternetProtocol)PersonallyIdentifiableInformation(PII)AcomputernetworkFirewallProtocolCertificateAuthoritiesPublic KeyEncryptionEncryptionAcomputingsystemBandwidthPacketCitizenScienceScalabilitySamplingAntivirusSoftwareComputerVirusByteFloatingPointRoutingTheCloudFreeSoftwareTCP(TransmissionControlProtocol)OpenAccessWidthInternetRougeAccessPointSamplingRateCreativeCommonsSSL/TLS(securesocketslayer/transportlayer security)MalwareIPAddressLosslessCompressionBinarySequencePathFaultToleranceAcomputingdeviceAnalogLossyCompressionPhishing

Unit 4 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
  1. ISP
  2. Digital Divide
  3. Crowdsourcing
  4. Redundancy
  5. Symmetric Encryption
  6. Packet Switching
  7. Router
  8. Decryption
  9. Word
  10. Computing Innovation
  11. Keylogging Software
  12. Open Source
  13. World Wide Web
  14. DDoS Attack (Distributed Denial of Service)
  15. IP (Internet Protocol)
  16. Personally Identifiable Information (PII)
  17. A computer network
  18. Firewall
  19. Protocol
  20. Certificate Authorities
  21. Public Key Encryption
  22. Encryption
  23. A computing system
  24. Bandwidth
  25. Packet
  26. Citizen Science
  27. Scalability
  28. Sampling
  29. Antivirus Software
  30. Computer Virus
  31. Byte
  32. Floating Point
  33. Routing
  34. The Cloud
  35. Free Software
  36. TCP (Transmission Control Protocol)
  37. Open Access
  38. Width
  39. Internet
  40. Rouge Access Point
  41. Sampling Rate
  42. Creative Commons
  43. SSL/TLS (secure sockets layer/transport layer security)
  44. Malware
  45. IP Address
  46. Lossless Compression
  47. Binary Sequence
  48. Path
  49. Fault Tolerance
  50. A computing device
  51. Analog
  52. Lossy Compression
  53. Phishing