ISP Public Key Encryption Free Software A computing device Byte Analog Decryption Certificate Authorities IP Address Router Fault Tolerance The Cloud Internet Word Phishing Packet Switching Scalability Redundancy Width Antivirus Software Lossy Compression Protocol Creative Commons Citizen Science A computing system Open Source Sampling Rate Lossless Compression Path World Wide Web Malware Packet Open Access Rouge Access Point DDoS Attack (Distributed Denial of Service) Encryption Sampling Computer Virus Firewall IP (Internet Protocol) Symmetric Encryption Crowdsourcing Keylogging Software Routing Computing Innovation Digital Divide SSL/TLS (secure sockets layer/transport layer security) Binary Sequence Bandwidth A computer network Floating Point TCP (Transmission Control Protocol) Personally Identifiable Information (PII) ISP Public Key Encryption Free Software A computing device Byte Analog Decryption Certificate Authorities IP Address Router Fault Tolerance The Cloud Internet Word Phishing Packet Switching Scalability Redundancy Width Antivirus Software Lossy Compression Protocol Creative Commons Citizen Science A computing system Open Source Sampling Rate Lossless Compression Path World Wide Web Malware Packet Open Access Rouge Access Point DDoS Attack (Distributed Denial of Service) Encryption Sampling Computer Virus Firewall IP (Internet Protocol) Symmetric Encryption Crowdsourcing Keylogging Software Routing Computing Innovation Digital Divide SSL/TLS (secure sockets layer/transport layer security) Binary Sequence Bandwidth A computer network Floating Point TCP (Transmission Control Protocol) Personally Identifiable Information (PII)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
ISP
Public Key Encryption
Free Software
A computing device
Byte
Analog
Decryption
Certificate Authorities
IP Address
Router
Fault Tolerance
The Cloud
Internet
Word
Phishing
Packet Switching
Scalability
Redundancy
Width
Antivirus Software
Lossy Compression
Protocol
Creative Commons
Citizen Science
A computing system
Open Source
Sampling Rate
Lossless Compression
Path
World Wide Web
Malware
Packet
Open Access
Rouge Access Point
DDoS Attack (Distributed Denial of Service)
Encryption
Sampling
Computer Virus
Firewall
IP (Internet Protocol)
Symmetric Encryption
Crowdsourcing
Keylogging Software
Routing
Computing Innovation
Digital Divide
SSL/TLS (secure sockets layer/transport layer security)
Binary Sequence
Bandwidth
A computer network
Floating Point
TCP (Transmission Control Protocol)
Personally Identifiable Information (PII)