RouterSamplingRateTheCloudDecryptionFirewallAntivirusSoftwareOpenSourcePacketLosslessCompressionPathPersonallyIdentifiableInformation(PII)ScalabilityAnalogRougeAccessPointISPAcomputernetworkAcomputingsystemBandwidthFreeSoftwareDDoS Attack(DistributedDenial ofService)SSL/TLS(securesocketslayer/transportlayer security)FloatingPointOpenAccessIPAddressPhishingIP(InternetProtocol)ProtocolRedundancySymmetricEncryptionInternetDigitalDivideCitizenScienceTCP(TransmissionControlProtocol)PacketSwitchingWidthCrowdsourcingAcomputingdeviceComputingInnovationPublic KeyEncryptionWordSamplingFaultToleranceLossyCompressionRoutingWorldWideWebByteBinarySequenceEncryptionCreativeCommonsComputerVirusMalwareKeyloggingSoftwareCertificateAuthoritiesRouterSamplingRateTheCloudDecryptionFirewallAntivirusSoftwareOpenSourcePacketLosslessCompressionPathPersonallyIdentifiableInformation(PII)ScalabilityAnalogRougeAccessPointISPAcomputernetworkAcomputingsystemBandwidthFreeSoftwareDDoS Attack(DistributedDenial ofService)SSL/TLS(securesocketslayer/transportlayer security)FloatingPointOpenAccessIPAddressPhishingIP(InternetProtocol)ProtocolRedundancySymmetricEncryptionInternetDigitalDivideCitizenScienceTCP(TransmissionControlProtocol)PacketSwitchingWidthCrowdsourcingAcomputingdeviceComputingInnovationPublic KeyEncryptionWordSamplingFaultToleranceLossyCompressionRoutingWorldWideWebByteBinarySequenceEncryptionCreativeCommonsComputerVirusMalwareKeyloggingSoftwareCertificateAuthorities

Unit 4 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
  1. Router
  2. Sampling Rate
  3. The Cloud
  4. Decryption
  5. Firewall
  6. Antivirus Software
  7. Open Source
  8. Packet
  9. Lossless Compression
  10. Path
  11. Personally Identifiable Information (PII)
  12. Scalability
  13. Analog
  14. Rouge Access Point
  15. ISP
  16. A computer network
  17. A computing system
  18. Bandwidth
  19. Free Software
  20. DDoS Attack (Distributed Denial of Service)
  21. SSL/TLS (secure sockets layer/transport layer security)
  22. Floating Point
  23. Open Access
  24. IP Address
  25. Phishing
  26. IP (Internet Protocol)
  27. Protocol
  28. Redundancy
  29. Symmetric Encryption
  30. Internet
  31. Digital Divide
  32. Citizen Science
  33. TCP (Transmission Control Protocol)
  34. Packet Switching
  35. Width
  36. Crowdsourcing
  37. A computing device
  38. Computing Innovation
  39. Public Key Encryption
  40. Word
  41. Sampling
  42. Fault Tolerance
  43. Lossy Compression
  44. Routing
  45. World Wide Web
  46. Byte
  47. Binary Sequence
  48. Encryption
  49. Creative Commons
  50. Computer Virus
  51. Malware
  52. Keylogging Software
  53. Certificate Authorities