ISPCitizenScienceBinarySequenceAntivirusSoftwareTheCloudIPAddressProtocolSymmetricEncryptionCrowdsourcingDecryptionPathByteComputerVirusOpenSourceFloatingPointAnalogFreeSoftwareLossyCompressionCreativeCommonsCertificateAuthoritiesAcomputingdeviceScalabilitySSL/TLS(securesocketslayer/transportlayer security)WorldWideWebOpenAccessEncryptionRoutingSamplingWordPacketSwitchingMalwarePacketComputingInnovationFirewallFaultToleranceAcomputernetworkLosslessCompressionAcomputingsystemSamplingRateDDoS Attack(DistributedDenial ofService)DigitalDivideRedundancyKeyloggingSoftwareRouterInternetBandwidthTCP(TransmissionControlProtocol)Public KeyEncryptionPhishingPersonallyIdentifiableInformation(PII)RougeAccessPointIP(InternetProtocol)WidthISPCitizenScienceBinarySequenceAntivirusSoftwareTheCloudIPAddressProtocolSymmetricEncryptionCrowdsourcingDecryptionPathByteComputerVirusOpenSourceFloatingPointAnalogFreeSoftwareLossyCompressionCreativeCommonsCertificateAuthoritiesAcomputingdeviceScalabilitySSL/TLS(securesocketslayer/transportlayer security)WorldWideWebOpenAccessEncryptionRoutingSamplingWordPacketSwitchingMalwarePacketComputingInnovationFirewallFaultToleranceAcomputernetworkLosslessCompressionAcomputingsystemSamplingRateDDoS Attack(DistributedDenial ofService)DigitalDivideRedundancyKeyloggingSoftwareRouterInternetBandwidthTCP(TransmissionControlProtocol)Public KeyEncryptionPhishingPersonallyIdentifiableInformation(PII)RougeAccessPointIP(InternetProtocol)Width

Unit 4 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
  1. ISP
  2. Citizen Science
  3. Binary Sequence
  4. Antivirus Software
  5. The Cloud
  6. IP Address
  7. Protocol
  8. Symmetric Encryption
  9. Crowdsourcing
  10. Decryption
  11. Path
  12. Byte
  13. Computer Virus
  14. Open Source
  15. Floating Point
  16. Analog
  17. Free Software
  18. Lossy Compression
  19. Creative Commons
  20. Certificate Authorities
  21. A computing device
  22. Scalability
  23. SSL/TLS (secure sockets layer/transport layer security)
  24. World Wide Web
  25. Open Access
  26. Encryption
  27. Routing
  28. Sampling
  29. Word
  30. Packet Switching
  31. Malware
  32. Packet
  33. Computing Innovation
  34. Firewall
  35. Fault Tolerance
  36. A computer network
  37. Lossless Compression
  38. A computing system
  39. Sampling Rate
  40. DDoS Attack (Distributed Denial of Service)
  41. Digital Divide
  42. Redundancy
  43. Keylogging Software
  44. Router
  45. Internet
  46. Bandwidth
  47. TCP (Transmission Control Protocol)
  48. Public Key Encryption
  49. Phishing
  50. Personally Identifiable Information (PII)
  51. Rouge Access Point
  52. IP (Internet Protocol)
  53. Width