ISPPublic KeyEncryptionFreeSoftwareAcomputingdeviceByteAnalogDecryptionCertificateAuthoritiesIPAddressRouterFaultToleranceTheCloudInternetWordPhishingPacketSwitchingScalabilityRedundancyWidthAntivirusSoftwareLossyCompressionProtocolCreativeCommonsCitizenScienceAcomputingsystemOpenSourceSamplingRateLosslessCompressionPathWorldWideWebMalwarePacketOpenAccessRougeAccessPointDDoS Attack(DistributedDenial ofService)EncryptionSamplingComputerVirusFirewallIP(InternetProtocol)SymmetricEncryptionCrowdsourcingKeyloggingSoftwareRoutingComputingInnovationDigitalDivideSSL/TLS(securesocketslayer/transportlayer security)BinarySequenceBandwidthAcomputernetworkFloatingPointTCP(TransmissionControlProtocol)PersonallyIdentifiableInformation(PII)ISPPublic KeyEncryptionFreeSoftwareAcomputingdeviceByteAnalogDecryptionCertificateAuthoritiesIPAddressRouterFaultToleranceTheCloudInternetWordPhishingPacketSwitchingScalabilityRedundancyWidthAntivirusSoftwareLossyCompressionProtocolCreativeCommonsCitizenScienceAcomputingsystemOpenSourceSamplingRateLosslessCompressionPathWorldWideWebMalwarePacketOpenAccessRougeAccessPointDDoS Attack(DistributedDenial ofService)EncryptionSamplingComputerVirusFirewallIP(InternetProtocol)SymmetricEncryptionCrowdsourcingKeyloggingSoftwareRoutingComputingInnovationDigitalDivideSSL/TLS(securesocketslayer/transportlayer security)BinarySequenceBandwidthAcomputernetworkFloatingPointTCP(TransmissionControlProtocol)PersonallyIdentifiableInformation(PII)

Unit 4 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
  1. ISP
  2. Public Key Encryption
  3. Free Software
  4. A computing device
  5. Byte
  6. Analog
  7. Decryption
  8. Certificate Authorities
  9. IP Address
  10. Router
  11. Fault Tolerance
  12. The Cloud
  13. Internet
  14. Word
  15. Phishing
  16. Packet Switching
  17. Scalability
  18. Redundancy
  19. Width
  20. Antivirus Software
  21. Lossy Compression
  22. Protocol
  23. Creative Commons
  24. Citizen Science
  25. A computing system
  26. Open Source
  27. Sampling Rate
  28. Lossless Compression
  29. Path
  30. World Wide Web
  31. Malware
  32. Packet
  33. Open Access
  34. Rouge Access Point
  35. DDoS Attack (Distributed Denial of Service)
  36. Encryption
  37. Sampling
  38. Computer Virus
  39. Firewall
  40. IP (Internet Protocol)
  41. Symmetric Encryption
  42. Crowdsourcing
  43. Keylogging Software
  44. Routing
  45. Computing Innovation
  46. Digital Divide
  47. SSL/TLS (secure sockets layer/transport layer security)
  48. Binary Sequence
  49. Bandwidth
  50. A computer network
  51. Floating Point
  52. TCP (Transmission Control Protocol)
  53. Personally Identifiable Information (PII)