SymmetricEncryptionRougeAccessPointDigitalDivideAcomputernetworkScalabilityPacketSwitchingEncryptionRedundancyComputingInnovationSSL/TLS(securesocketslayer/transportlayer security)ProtocolRoutingComputerVirusTCP(TransmissionControlProtocol)ISPFreeSoftwareCitizenScienceOpenAccessPublic KeyEncryptionWidthIPAddressInternetCrowdsourcingLossyCompressionCreativeCommonsAcomputingsystemFirewallDecryptionPhishingWordRouterAcomputingdeviceTheCloudFaultToleranceIP(InternetProtocol)KeyloggingSoftwareBinarySequenceSamplingRateLosslessCompressionSamplingBandwidthOpenSourceAnalogFloatingPointMalwareAntivirusSoftwareDDoS Attack(DistributedDenial ofService)PathCertificateAuthoritiesPacketPersonallyIdentifiableInformation(PII)WorldWideWebByteSymmetricEncryptionRougeAccessPointDigitalDivideAcomputernetworkScalabilityPacketSwitchingEncryptionRedundancyComputingInnovationSSL/TLS(securesocketslayer/transportlayer security)ProtocolRoutingComputerVirusTCP(TransmissionControlProtocol)ISPFreeSoftwareCitizenScienceOpenAccessPublic KeyEncryptionWidthIPAddressInternetCrowdsourcingLossyCompressionCreativeCommonsAcomputingsystemFirewallDecryptionPhishingWordRouterAcomputingdeviceTheCloudFaultToleranceIP(InternetProtocol)KeyloggingSoftwareBinarySequenceSamplingRateLosslessCompressionSamplingBandwidthOpenSourceAnalogFloatingPointMalwareAntivirusSoftwareDDoS Attack(DistributedDenial ofService)PathCertificateAuthoritiesPacketPersonallyIdentifiableInformation(PII)WorldWideWebByte

Unit 4 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
  1. Symmetric Encryption
  2. Rouge Access Point
  3. Digital Divide
  4. A computer network
  5. Scalability
  6. Packet Switching
  7. Encryption
  8. Redundancy
  9. Computing Innovation
  10. SSL/TLS (secure sockets layer/transport layer security)
  11. Protocol
  12. Routing
  13. Computer Virus
  14. TCP (Transmission Control Protocol)
  15. ISP
  16. Free Software
  17. Citizen Science
  18. Open Access
  19. Public Key Encryption
  20. Width
  21. IP Address
  22. Internet
  23. Crowdsourcing
  24. Lossy Compression
  25. Creative Commons
  26. A computing system
  27. Firewall
  28. Decryption
  29. Phishing
  30. Word
  31. Router
  32. A computing device
  33. The Cloud
  34. Fault Tolerance
  35. IP (Internet Protocol)
  36. Keylogging Software
  37. Binary Sequence
  38. Sampling Rate
  39. Lossless Compression
  40. Sampling
  41. Bandwidth
  42. Open Source
  43. Analog
  44. Floating Point
  45. Malware
  46. Antivirus Software
  47. DDoS Attack (Distributed Denial of Service)
  48. Path
  49. Certificate Authorities
  50. Packet
  51. Personally Identifiable Information (PII)
  52. World Wide Web
  53. Byte