Analog Open Source Keylogging Software Protocol Decryption Floating Point SSL/TLS (secure sockets layer/transport layer security) Lossless Compression Sampling Rate Width Phishing Firewall Bandwidth Lossy Compression Antivirus Software Symmetric Encryption Open Access Scalability Packet Packet Switching Redundancy Digital Divide Word ISP IP (Internet Protocol) Computer Virus Public Key Encryption Binary Sequence Routing Rouge Access Point A computer network Crowdsourcing Sampling IP Address Computing Innovation Fault Tolerance World Wide Web Path TCP (Transmission Control Protocol) A computing device Encryption Byte Router The Cloud A computing system DDoS Attack (Distributed Denial of Service) Free Software Internet Certificate Authorities Malware Citizen Science Personally Identifiable Information (PII) Creative Commons Analog Open Source Keylogging Software Protocol Decryption Floating Point SSL/TLS (secure sockets layer/transport layer security) Lossless Compression Sampling Rate Width Phishing Firewall Bandwidth Lossy Compression Antivirus Software Symmetric Encryption Open Access Scalability Packet Packet Switching Redundancy Digital Divide Word ISP IP (Internet Protocol) Computer Virus Public Key Encryption Binary Sequence Routing Rouge Access Point A computer network Crowdsourcing Sampling IP Address Computing Innovation Fault Tolerance World Wide Web Path TCP (Transmission Control Protocol) A computing device Encryption Byte Router The Cloud A computing system DDoS Attack (Distributed Denial of Service) Free Software Internet Certificate Authorities Malware Citizen Science Personally Identifiable Information (PII) Creative Commons
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Analog
Open Source
Keylogging Software
Protocol
Decryption
Floating Point
SSL/TLS (secure sockets layer/transport layer security)
Lossless Compression
Sampling Rate
Width
Phishing
Firewall
Bandwidth
Lossy Compression
Antivirus Software
Symmetric Encryption
Open Access
Scalability
Packet
Packet Switching
Redundancy
Digital Divide
Word
ISP
IP (Internet Protocol)
Computer Virus
Public Key Encryption
Binary Sequence
Routing
Rouge Access Point
A computer network
Crowdsourcing
Sampling
IP Address
Computing Innovation
Fault Tolerance
World Wide Web
Path
TCP (Transmission Control Protocol)
A computing device
Encryption
Byte
Router
The Cloud
A computing system
DDoS Attack (Distributed Denial of Service)
Free Software
Internet
Certificate Authorities
Malware
Citizen Science
Personally Identifiable Information (PII)
Creative Commons