ByteAcomputingdeviceRedundancyWorldWideWebCertificateAuthoritiesCreativeCommonsFreeSoftwareOpenSourceIPAddressAnalogLossyCompressionISPPacketSwitchingTCP(TransmissionControlProtocol)SamplingRateFloatingPointLosslessCompressionDecryptionRouterRoutingCitizenScienceInternetScalabilityFirewallKeyloggingSoftwarePhishingWordPersonallyIdentifiableInformation(PII)FaultToleranceComputingInnovationBandwidthPacketComputerVirusTheCloudPathWidthSamplingRougeAccessPointAcomputingsystemEncryptionSymmetricEncryptionCrowdsourcingDDoS Attack(DistributedDenial ofService)BinarySequencePublic KeyEncryptionDigitalDivideIP(InternetProtocol)ProtocolOpenAccessAntivirusSoftwareAcomputernetworkSSL/TLS(securesocketslayer/transportlayer security)MalwareByteAcomputingdeviceRedundancyWorldWideWebCertificateAuthoritiesCreativeCommonsFreeSoftwareOpenSourceIPAddressAnalogLossyCompressionISPPacketSwitchingTCP(TransmissionControlProtocol)SamplingRateFloatingPointLosslessCompressionDecryptionRouterRoutingCitizenScienceInternetScalabilityFirewallKeyloggingSoftwarePhishingWordPersonallyIdentifiableInformation(PII)FaultToleranceComputingInnovationBandwidthPacketComputerVirusTheCloudPathWidthSamplingRougeAccessPointAcomputingsystemEncryptionSymmetricEncryptionCrowdsourcingDDoS Attack(DistributedDenial ofService)BinarySequencePublic KeyEncryptionDigitalDivideIP(InternetProtocol)ProtocolOpenAccessAntivirusSoftwareAcomputernetworkSSL/TLS(securesocketslayer/transportlayer security)Malware

Unit 4 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
  1. Byte
  2. A computing device
  3. Redundancy
  4. World Wide Web
  5. Certificate Authorities
  6. Creative Commons
  7. Free Software
  8. Open Source
  9. IP Address
  10. Analog
  11. Lossy Compression
  12. ISP
  13. Packet Switching
  14. TCP (Transmission Control Protocol)
  15. Sampling Rate
  16. Floating Point
  17. Lossless Compression
  18. Decryption
  19. Router
  20. Routing
  21. Citizen Science
  22. Internet
  23. Scalability
  24. Firewall
  25. Keylogging Software
  26. Phishing
  27. Word
  28. Personally Identifiable Information (PII)
  29. Fault Tolerance
  30. Computing Innovation
  31. Bandwidth
  32. Packet
  33. Computer Virus
  34. The Cloud
  35. Path
  36. Width
  37. Sampling
  38. Rouge Access Point
  39. A computing system
  40. Encryption
  41. Symmetric Encryption
  42. Crowdsourcing
  43. DDoS Attack (Distributed Denial of Service)
  44. Binary Sequence
  45. Public Key Encryption
  46. Digital Divide
  47. IP (Internet Protocol)
  48. Protocol
  49. Open Access
  50. Antivirus Software
  51. A computer network
  52. SSL/TLS (secure sockets layer/transport layer security)
  53. Malware