ISP Digital Divide Crowdsourcing Redundancy Symmetric Encryption Packet Switching Router Decryption Word Computing Innovation Keylogging Software Open Source World Wide Web DDoS Attack (Distributed Denial of Service) IP (Internet Protocol) Personally Identifiable Information (PII) A computer network Firewall Protocol Certificate Authorities Public Key Encryption Encryption A computing system Bandwidth Packet Citizen Science Scalability Sampling Antivirus Software Computer Virus Byte Floating Point Routing The Cloud Free Software TCP (Transmission Control Protocol) Open Access Width Internet Rouge Access Point Sampling Rate Creative Commons SSL/TLS (secure sockets layer/transport layer security) Malware IP Address Lossless Compression Binary Sequence Path Fault Tolerance A computing device Analog Lossy Compression Phishing ISP Digital Divide Crowdsourcing Redundancy Symmetric Encryption Packet Switching Router Decryption Word Computing Innovation Keylogging Software Open Source World Wide Web DDoS Attack (Distributed Denial of Service) IP (Internet Protocol) Personally Identifiable Information (PII) A computer network Firewall Protocol Certificate Authorities Public Key Encryption Encryption A computing system Bandwidth Packet Citizen Science Scalability Sampling Antivirus Software Computer Virus Byte Floating Point Routing The Cloud Free Software TCP (Transmission Control Protocol) Open Access Width Internet Rouge Access Point Sampling Rate Creative Commons SSL/TLS (secure sockets layer/transport layer security) Malware IP Address Lossless Compression Binary Sequence Path Fault Tolerance A computing device Analog Lossy Compression Phishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
ISP
Digital Divide
Crowdsourcing
Redundancy
Symmetric Encryption
Packet Switching
Router
Decryption
Word
Computing Innovation
Keylogging Software
Open Source
World Wide Web
DDoS Attack (Distributed Denial of Service)
IP (Internet Protocol)
Personally Identifiable Information (PII)
A computer network
Firewall
Protocol
Certificate Authorities
Public Key Encryption
Encryption
A computing system
Bandwidth
Packet
Citizen Science
Scalability
Sampling
Antivirus Software
Computer Virus
Byte
Floating Point
Routing
The Cloud
Free Software
TCP (Transmission Control Protocol)
Open Access
Width
Internet
Rouge Access Point
Sampling Rate
Creative Commons
SSL/TLS (secure sockets layer/transport layer security)
Malware
IP Address
Lossless Compression
Binary Sequence
Path
Fault Tolerance
A computing device
Analog
Lossy Compression
Phishing