AnalogOpenSourceKeyloggingSoftwareProtocolDecryptionFloatingPointSSL/TLS(securesocketslayer/transportlayer security)LosslessCompressionSamplingRateWidthPhishingFirewallBandwidthLossyCompressionAntivirusSoftwareSymmetricEncryptionOpenAccessScalabilityPacketPacketSwitchingRedundancyDigitalDivideWordISPIP(InternetProtocol)ComputerVirusPublic KeyEncryptionBinarySequenceRoutingRougeAccessPointAcomputernetworkCrowdsourcingSamplingIPAddressComputingInnovationFaultToleranceWorldWideWebPathTCP(TransmissionControlProtocol)AcomputingdeviceEncryptionByteRouterTheCloudAcomputingsystemDDoS Attack(DistributedDenial ofService)FreeSoftwareInternetCertificateAuthoritiesMalwareCitizenSciencePersonallyIdentifiableInformation(PII)CreativeCommonsAnalogOpenSourceKeyloggingSoftwareProtocolDecryptionFloatingPointSSL/TLS(securesocketslayer/transportlayer security)LosslessCompressionSamplingRateWidthPhishingFirewallBandwidthLossyCompressionAntivirusSoftwareSymmetricEncryptionOpenAccessScalabilityPacketPacketSwitchingRedundancyDigitalDivideWordISPIP(InternetProtocol)ComputerVirusPublic KeyEncryptionBinarySequenceRoutingRougeAccessPointAcomputernetworkCrowdsourcingSamplingIPAddressComputingInnovationFaultToleranceWorldWideWebPathTCP(TransmissionControlProtocol)AcomputingdeviceEncryptionByteRouterTheCloudAcomputingsystemDDoS Attack(DistributedDenial ofService)FreeSoftwareInternetCertificateAuthoritiesMalwareCitizenSciencePersonallyIdentifiableInformation(PII)CreativeCommons

Unit 4 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
  1. Analog
  2. Open Source
  3. Keylogging Software
  4. Protocol
  5. Decryption
  6. Floating Point
  7. SSL/TLS (secure sockets layer/transport layer security)
  8. Lossless Compression
  9. Sampling Rate
  10. Width
  11. Phishing
  12. Firewall
  13. Bandwidth
  14. Lossy Compression
  15. Antivirus Software
  16. Symmetric Encryption
  17. Open Access
  18. Scalability
  19. Packet
  20. Packet Switching
  21. Redundancy
  22. Digital Divide
  23. Word
  24. ISP
  25. IP (Internet Protocol)
  26. Computer Virus
  27. Public Key Encryption
  28. Binary Sequence
  29. Routing
  30. Rouge Access Point
  31. A computer network
  32. Crowdsourcing
  33. Sampling
  34. IP Address
  35. Computing Innovation
  36. Fault Tolerance
  37. World Wide Web
  38. Path
  39. TCP (Transmission Control Protocol)
  40. A computing device
  41. Encryption
  42. Byte
  43. Router
  44. The Cloud
  45. A computing system
  46. DDoS Attack (Distributed Denial of Service)
  47. Free Software
  48. Internet
  49. Certificate Authorities
  50. Malware
  51. Citizen Science
  52. Personally Identifiable Information (PII)
  53. Creative Commons