Analog Protocol World Wide Web A computing system Routing Decryption Packet Switching DDoS Attack (Distributed Denial of Service) Open Source Firewall Personally Identifiable Information (PII) Free Software Creative Commons Packet Computer Virus Byte Redundancy Citizen Science Path Sampling Rate Floating Point Word IP Address Sampling Rouge Access Point Symmetric Encryption Open Access Antivirus Software Phishing Public Key Encryption IP (Internet Protocol) Binary Sequence Bandwidth TCP (Transmission Control Protocol) Encryption Digital Divide Malware A computer network Keylogging Software The Cloud Router Width Lossy Compression SSL/TLS (secure sockets layer/transport layer security) ISP Computing Innovation Crowdsourcing Scalability Internet Lossless Compression A computing device Fault Tolerance Certificate Authorities Analog Protocol World Wide Web A computing system Routing Decryption Packet Switching DDoS Attack (Distributed Denial of Service) Open Source Firewall Personally Identifiable Information (PII) Free Software Creative Commons Packet Computer Virus Byte Redundancy Citizen Science Path Sampling Rate Floating Point Word IP Address Sampling Rouge Access Point Symmetric Encryption Open Access Antivirus Software Phishing Public Key Encryption IP (Internet Protocol) Binary Sequence Bandwidth TCP (Transmission Control Protocol) Encryption Digital Divide Malware A computer network Keylogging Software The Cloud Router Width Lossy Compression SSL/TLS (secure sockets layer/transport layer security) ISP Computing Innovation Crowdsourcing Scalability Internet Lossless Compression A computing device Fault Tolerance Certificate Authorities
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Analog
Protocol
World Wide Web
A computing system
Routing
Decryption
Packet Switching
DDoS Attack (Distributed Denial of Service)
Open Source
Firewall
Personally Identifiable Information (PII)
Free Software
Creative Commons
Packet
Computer Virus
Byte
Redundancy
Citizen Science
Path
Sampling Rate
Floating Point
Word
IP Address
Sampling
Rouge Access Point
Symmetric Encryption
Open Access
Antivirus Software
Phishing
Public Key Encryption
IP (Internet Protocol)
Binary Sequence
Bandwidth
TCP (Transmission Control Protocol)
Encryption
Digital Divide
Malware
A computer network
Keylogging Software
The Cloud
Router
Width
Lossy Compression
SSL/TLS (secure sockets layer/transport layer security)
ISP
Computing Innovation
Crowdsourcing
Scalability
Internet
Lossless Compression
A computing device
Fault Tolerance
Certificate Authorities