Router Sampling Rate The Cloud Decryption Firewall Antivirus Software Open Source Packet Lossless Compression Path Personally Identifiable Information (PII) Scalability Analog Rouge Access Point ISP A computer network A computing system Bandwidth Free Software DDoS Attack (Distributed Denial of Service) SSL/TLS (secure sockets layer/transport layer security) Floating Point Open Access IP Address Phishing IP (Internet Protocol) Protocol Redundancy Symmetric Encryption Internet Digital Divide Citizen Science TCP (Transmission Control Protocol) Packet Switching Width Crowdsourcing A computing device Computing Innovation Public Key Encryption Word Sampling Fault Tolerance Lossy Compression Routing World Wide Web Byte Binary Sequence Encryption Creative Commons Computer Virus Malware Keylogging Software Certificate Authorities Router Sampling Rate The Cloud Decryption Firewall Antivirus Software Open Source Packet Lossless Compression Path Personally Identifiable Information (PII) Scalability Analog Rouge Access Point ISP A computer network A computing system Bandwidth Free Software DDoS Attack (Distributed Denial of Service) SSL/TLS (secure sockets layer/transport layer security) Floating Point Open Access IP Address Phishing IP (Internet Protocol) Protocol Redundancy Symmetric Encryption Internet Digital Divide Citizen Science TCP (Transmission Control Protocol) Packet Switching Width Crowdsourcing A computing device Computing Innovation Public Key Encryption Word Sampling Fault Tolerance Lossy Compression Routing World Wide Web Byte Binary Sequence Encryption Creative Commons Computer Virus Malware Keylogging Software Certificate Authorities
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Router
Sampling Rate
The Cloud
Decryption
Firewall
Antivirus Software
Open Source
Packet
Lossless Compression
Path
Personally Identifiable Information (PII)
Scalability
Analog
Rouge Access Point
ISP
A computer network
A computing system
Bandwidth
Free Software
DDoS Attack (Distributed Denial of Service)
SSL/TLS (secure sockets layer/transport layer security)
Floating Point
Open Access
IP Address
Phishing
IP (Internet Protocol)
Protocol
Redundancy
Symmetric Encryption
Internet
Digital Divide
Citizen Science
TCP (Transmission Control Protocol)
Packet Switching
Width
Crowdsourcing
A computing device
Computing Innovation
Public Key Encryption
Word
Sampling
Fault Tolerance
Lossy Compression
Routing
World Wide Web
Byte
Binary Sequence
Encryption
Creative Commons
Computer Virus
Malware
Keylogging Software
Certificate Authorities