DDoS Attack(DistributedDenial ofService)FloatingPointWidthPhishingIPAddressSymmetricEncryptionAnalogPersonallyIdentifiableInformation(PII)IP(InternetProtocol)KeyloggingSoftwareRoutingCitizenScienceOpenAccessFreeSoftwareDecryptionISPFirewallTheCloudWorldWideWebOpenSourceInternetCreativeCommonsBinarySequencePacketSwitchingScalabilityProtocolSSL/TLS(securesocketslayer/transportlayer security)SamplingRateComputingInnovationRouterCertificateAuthoritiesLossyCompressionMalwarePathAcomputingdeviceEncryptionComputerVirusLosslessCompressionBandwidthByteWordTCP(TransmissionControlProtocol)RedundancyFaultTolerancePacketAntivirusSoftwareDigitalDivideSamplingPublic KeyEncryptionRougeAccessPointAcomputingsystemCrowdsourcingAcomputernetworkDDoS Attack(DistributedDenial ofService)FloatingPointWidthPhishingIPAddressSymmetricEncryptionAnalogPersonallyIdentifiableInformation(PII)IP(InternetProtocol)KeyloggingSoftwareRoutingCitizenScienceOpenAccessFreeSoftwareDecryptionISPFirewallTheCloudWorldWideWebOpenSourceInternetCreativeCommonsBinarySequencePacketSwitchingScalabilityProtocolSSL/TLS(securesocketslayer/transportlayer security)SamplingRateComputingInnovationRouterCertificateAuthoritiesLossyCompressionMalwarePathAcomputingdeviceEncryptionComputerVirusLosslessCompressionBandwidthByteWordTCP(TransmissionControlProtocol)RedundancyFaultTolerancePacketAntivirusSoftwareDigitalDivideSamplingPublic KeyEncryptionRougeAccessPointAcomputingsystemCrowdsourcingAcomputernetwork

Unit 4 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
  1. DDoS Attack (Distributed Denial of Service)
  2. Floating Point
  3. Width
  4. Phishing
  5. IP Address
  6. Symmetric Encryption
  7. Analog
  8. Personally Identifiable Information (PII)
  9. IP (Internet Protocol)
  10. Keylogging Software
  11. Routing
  12. Citizen Science
  13. Open Access
  14. Free Software
  15. Decryption
  16. ISP
  17. Firewall
  18. The Cloud
  19. World Wide Web
  20. Open Source
  21. Internet
  22. Creative Commons
  23. Binary Sequence
  24. Packet Switching
  25. Scalability
  26. Protocol
  27. SSL/TLS (secure sockets layer/transport layer security)
  28. Sampling Rate
  29. Computing Innovation
  30. Router
  31. Certificate Authorities
  32. Lossy Compression
  33. Malware
  34. Path
  35. A computing device
  36. Encryption
  37. Computer Virus
  38. Lossless Compression
  39. Bandwidth
  40. Byte
  41. Word
  42. TCP (Transmission Control Protocol)
  43. Redundancy
  44. Fault Tolerance
  45. Packet
  46. Antivirus Software
  47. Digital Divide
  48. Sampling
  49. Public Key Encryption
  50. Rouge Access Point
  51. A computing system
  52. Crowdsourcing
  53. A computer network