DDoS Attack (Distributed Denial of Service) Floating Point Width Phishing IP Address Symmetric Encryption Analog Personally Identifiable Information (PII) IP (Internet Protocol) Keylogging Software Routing Citizen Science Open Access Free Software Decryption ISP Firewall The Cloud World Wide Web Open Source Internet Creative Commons Binary Sequence Packet Switching Scalability Protocol SSL/TLS (secure sockets layer/transport layer security) Sampling Rate Computing Innovation Router Certificate Authorities Lossy Compression Malware Path A computing device Encryption Computer Virus Lossless Compression Bandwidth Byte Word TCP (Transmission Control Protocol) Redundancy Fault Tolerance Packet Antivirus Software Digital Divide Sampling Public Key Encryption Rouge Access Point A computing system Crowdsourcing A computer network DDoS Attack (Distributed Denial of Service) Floating Point Width Phishing IP Address Symmetric Encryption Analog Personally Identifiable Information (PII) IP (Internet Protocol) Keylogging Software Routing Citizen Science Open Access Free Software Decryption ISP Firewall The Cloud World Wide Web Open Source Internet Creative Commons Binary Sequence Packet Switching Scalability Protocol SSL/TLS (secure sockets layer/transport layer security) Sampling Rate Computing Innovation Router Certificate Authorities Lossy Compression Malware Path A computing device Encryption Computer Virus Lossless Compression Bandwidth Byte Word TCP (Transmission Control Protocol) Redundancy Fault Tolerance Packet Antivirus Software Digital Divide Sampling Public Key Encryption Rouge Access Point A computing system Crowdsourcing A computer network
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
DDoS Attack (Distributed Denial of Service)
Floating Point
Width
Phishing
IP Address
Symmetric Encryption
Analog
Personally Identifiable Information (PII)
IP (Internet Protocol)
Keylogging Software
Routing
Citizen Science
Open Access
Free Software
Decryption
ISP
Firewall
The Cloud
World Wide Web
Open Source
Internet
Creative Commons
Binary Sequence
Packet Switching
Scalability
Protocol
SSL/TLS (secure sockets layer/transport layer security)
Sampling Rate
Computing Innovation
Router
Certificate Authorities
Lossy Compression
Malware
Path
A computing device
Encryption
Computer Virus
Lossless Compression
Bandwidth
Byte
Word
TCP (Transmission Control Protocol)
Redundancy
Fault Tolerance
Packet
Antivirus Software
Digital Divide
Sampling
Public Key Encryption
Rouge Access Point
A computing system
Crowdsourcing
A computer network