Symmetric Encryption Rouge Access Point Digital Divide A computer network Scalability Packet Switching Encryption Redundancy Computing Innovation SSL/TLS (secure sockets layer/transport layer security) Protocol Routing Computer Virus TCP (Transmission Control Protocol) ISP Free Software Citizen Science Open Access Public Key Encryption Width IP Address Internet Crowdsourcing Lossy Compression Creative Commons A computing system Firewall Decryption Phishing Word Router A computing device The Cloud Fault Tolerance IP (Internet Protocol) Keylogging Software Binary Sequence Sampling Rate Lossless Compression Sampling Bandwidth Open Source Analog Floating Point Malware Antivirus Software DDoS Attack (Distributed Denial of Service) Path Certificate Authorities Packet Personally Identifiable Information (PII) World Wide Web Byte Symmetric Encryption Rouge Access Point Digital Divide A computer network Scalability Packet Switching Encryption Redundancy Computing Innovation SSL/TLS (secure sockets layer/transport layer security) Protocol Routing Computer Virus TCP (Transmission Control Protocol) ISP Free Software Citizen Science Open Access Public Key Encryption Width IP Address Internet Crowdsourcing Lossy Compression Creative Commons A computing system Firewall Decryption Phishing Word Router A computing device The Cloud Fault Tolerance IP (Internet Protocol) Keylogging Software Binary Sequence Sampling Rate Lossless Compression Sampling Bandwidth Open Source Analog Floating Point Malware Antivirus Software DDoS Attack (Distributed Denial of Service) Path Certificate Authorities Packet Personally Identifiable Information (PII) World Wide Web Byte
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Symmetric Encryption
Rouge Access Point
Digital Divide
A computer network
Scalability
Packet Switching
Encryption
Redundancy
Computing Innovation
SSL/TLS (secure sockets layer/transport layer security)
Protocol
Routing
Computer Virus
TCP (Transmission Control Protocol)
ISP
Free Software
Citizen Science
Open Access
Public Key Encryption
Width
IP Address
Internet
Crowdsourcing
Lossy Compression
Creative Commons
A computing system
Firewall
Decryption
Phishing
Word
Router
A computing device
The Cloud
Fault Tolerance
IP (Internet Protocol)
Keylogging Software
Binary Sequence
Sampling Rate
Lossless Compression
Sampling
Bandwidth
Open Source
Analog
Floating Point
Malware
Antivirus Software
DDoS Attack (Distributed Denial of Service)
Path
Certificate Authorities
Packet
Personally Identifiable Information (PII)
World Wide Web
Byte