A computing system Digital Divide IP (Internet Protocol) Packet Sampling Fault Tolerance Routing Personally Identifiable Information (PII) Internet Computing Innovation Router Public Key Encryption Bandwidth Sampling Rate Path Antivirus Software Lossless Compression The Cloud Rouge Access Point Malware ISP World Wide Web Free Software Protocol Firewall Binary Sequence Floating Point Width Phishing Keylogging Software A computing device Redundancy Packet Switching Citizen Science Creative Commons Crowdsourcing IP Address DDoS Attack (Distributed Denial of Service) Scalability Byte Open Source Open Access SSL/TLS (secure sockets layer/transport layer security) Symmetric Encryption A computer network Word Computer Virus Analog TCP (Transmission Control Protocol) Decryption Certificate Authorities Encryption Lossy Compression A computing system Digital Divide IP (Internet Protocol) Packet Sampling Fault Tolerance Routing Personally Identifiable Information (PII) Internet Computing Innovation Router Public Key Encryption Bandwidth Sampling Rate Path Antivirus Software Lossless Compression The Cloud Rouge Access Point Malware ISP World Wide Web Free Software Protocol Firewall Binary Sequence Floating Point Width Phishing Keylogging Software A computing device Redundancy Packet Switching Citizen Science Creative Commons Crowdsourcing IP Address DDoS Attack (Distributed Denial of Service) Scalability Byte Open Source Open Access SSL/TLS (secure sockets layer/transport layer security) Symmetric Encryption A computer network Word Computer Virus Analog TCP (Transmission Control Protocol) Decryption Certificate Authorities Encryption Lossy Compression
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
A computing system
Digital Divide
IP (Internet Protocol)
Packet
Sampling
Fault Tolerance
Routing
Personally Identifiable Information (PII)
Internet
Computing Innovation
Router
Public Key Encryption
Bandwidth
Sampling Rate
Path
Antivirus Software
Lossless Compression
The Cloud
Rouge Access Point
Malware
ISP
World Wide Web
Free Software
Protocol
Firewall
Binary Sequence
Floating Point
Width
Phishing
Keylogging Software
A computing device
Redundancy
Packet Switching
Citizen Science
Creative Commons
Crowdsourcing
IP Address
DDoS Attack (Distributed Denial of Service)
Scalability
Byte
Open Source
Open Access
SSL/TLS (secure sockets layer/transport layer security)
Symmetric Encryption
A computer network
Word
Computer Virus
Analog
TCP (Transmission Control Protocol)
Decryption
Certificate Authorities
Encryption
Lossy Compression