CreativeCommonsPathRoutingAntivirusSoftwareWordAcomputingdeviceOpenSourceFreeSoftwareCitizenScienceDecryptionKeyloggingSoftwareEncryptionBytePhishingDDoS Attack(DistributedDenial ofService)Public KeyEncryptionTCP(TransmissionControlProtocol)ScalabilityRouterRougeAccessPointPacketSwitchingLossyCompressionInternetComputerVirusDigitalDivideIP(InternetProtocol)SymmetricEncryptionOpenAccessPersonallyIdentifiableInformation(PII)WorldWideWebAnalogMalwareSamplingCertificateAuthoritiesFloatingPointFirewallProtocolLosslessCompressionBinarySequenceTheCloudRedundancySSL/TLS(securesocketslayer/transportlayer security)ISPIPAddressFaultToleranceCrowdsourcingAcomputernetworkWidthPacketComputingInnovationBandwidthAcomputingsystemSamplingRateCreativeCommonsPathRoutingAntivirusSoftwareWordAcomputingdeviceOpenSourceFreeSoftwareCitizenScienceDecryptionKeyloggingSoftwareEncryptionBytePhishingDDoS Attack(DistributedDenial ofService)Public KeyEncryptionTCP(TransmissionControlProtocol)ScalabilityRouterRougeAccessPointPacketSwitchingLossyCompressionInternetComputerVirusDigitalDivideIP(InternetProtocol)SymmetricEncryptionOpenAccessPersonallyIdentifiableInformation(PII)WorldWideWebAnalogMalwareSamplingCertificateAuthoritiesFloatingPointFirewallProtocolLosslessCompressionBinarySequenceTheCloudRedundancySSL/TLS(securesocketslayer/transportlayer security)ISPIPAddressFaultToleranceCrowdsourcingAcomputernetworkWidthPacketComputingInnovationBandwidthAcomputingsystemSamplingRate

Unit 4 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
  1. Creative Commons
  2. Path
  3. Routing
  4. Antivirus Software
  5. Word
  6. A computing device
  7. Open Source
  8. Free Software
  9. Citizen Science
  10. Decryption
  11. Keylogging Software
  12. Encryption
  13. Byte
  14. Phishing
  15. DDoS Attack (Distributed Denial of Service)
  16. Public Key Encryption
  17. TCP (Transmission Control Protocol)
  18. Scalability
  19. Router
  20. Rouge Access Point
  21. Packet Switching
  22. Lossy Compression
  23. Internet
  24. Computer Virus
  25. Digital Divide
  26. IP (Internet Protocol)
  27. Symmetric Encryption
  28. Open Access
  29. Personally Identifiable Information (PII)
  30. World Wide Web
  31. Analog
  32. Malware
  33. Sampling
  34. Certificate Authorities
  35. Floating Point
  36. Firewall
  37. Protocol
  38. Lossless Compression
  39. Binary Sequence
  40. The Cloud
  41. Redundancy
  42. SSL/TLS (secure sockets layer/transport layer security)
  43. ISP
  44. IP Address
  45. Fault Tolerance
  46. Crowdsourcing
  47. A computer network
  48. Width
  49. Packet
  50. Computing Innovation
  51. Bandwidth
  52. A computing system
  53. Sampling Rate