Byte A computing device Redundancy World Wide Web Certificate Authorities Creative Commons Free Software Open Source IP Address Analog Lossy Compression ISP Packet Switching TCP (Transmission Control Protocol) Sampling Rate Floating Point Lossless Compression Decryption Router Routing Citizen Science Internet Scalability Firewall Keylogging Software Phishing Word Personally Identifiable Information (PII) Fault Tolerance Computing Innovation Bandwidth Packet Computer Virus The Cloud Path Width Sampling Rouge Access Point A computing system Encryption Symmetric Encryption Crowdsourcing DDoS Attack (Distributed Denial of Service) Binary Sequence Public Key Encryption Digital Divide IP (Internet Protocol) Protocol Open Access Antivirus Software A computer network SSL/TLS (secure sockets layer/transport layer security) Malware Byte A computing device Redundancy World Wide Web Certificate Authorities Creative Commons Free Software Open Source IP Address Analog Lossy Compression ISP Packet Switching TCP (Transmission Control Protocol) Sampling Rate Floating Point Lossless Compression Decryption Router Routing Citizen Science Internet Scalability Firewall Keylogging Software Phishing Word Personally Identifiable Information (PII) Fault Tolerance Computing Innovation Bandwidth Packet Computer Virus The Cloud Path Width Sampling Rouge Access Point A computing system Encryption Symmetric Encryption Crowdsourcing DDoS Attack (Distributed Denial of Service) Binary Sequence Public Key Encryption Digital Divide IP (Internet Protocol) Protocol Open Access Antivirus Software A computer network SSL/TLS (secure sockets layer/transport layer security) Malware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Byte
A computing device
Redundancy
World Wide Web
Certificate Authorities
Creative Commons
Free Software
Open Source
IP Address
Analog
Lossy Compression
ISP
Packet Switching
TCP (Transmission Control Protocol)
Sampling Rate
Floating Point
Lossless Compression
Decryption
Router
Routing
Citizen Science
Internet
Scalability
Firewall
Keylogging Software
Phishing
Word
Personally Identifiable Information (PII)
Fault Tolerance
Computing Innovation
Bandwidth
Packet
Computer Virus
The Cloud
Path
Width
Sampling
Rouge Access Point
A computing system
Encryption
Symmetric Encryption
Crowdsourcing
DDoS Attack (Distributed Denial of Service)
Binary Sequence
Public Key Encryption
Digital Divide
IP (Internet Protocol)
Protocol
Open Access
Antivirus Software
A computer network
SSL/TLS (secure sockets layer/transport layer security)
Malware