AnalogProtocolWorldWideWebAcomputingsystemRoutingDecryptionPacketSwitchingDDoS Attack(DistributedDenial ofService)OpenSourceFirewallPersonallyIdentifiableInformation(PII)FreeSoftwareCreativeCommonsPacketComputerVirusByteRedundancyCitizenSciencePathSamplingRateFloatingPointWordIPAddressSamplingRougeAccessPointSymmetricEncryptionOpenAccessAntivirusSoftwarePhishingPublic KeyEncryptionIP(InternetProtocol)BinarySequenceBandwidthTCP(TransmissionControlProtocol)EncryptionDigitalDivideMalwareAcomputernetworkKeyloggingSoftwareTheCloudRouterWidthLossyCompressionSSL/TLS(securesocketslayer/transportlayer security)ISPComputingInnovationCrowdsourcingScalabilityInternetLosslessCompressionAcomputingdeviceFaultToleranceCertificateAuthoritiesAnalogProtocolWorldWideWebAcomputingsystemRoutingDecryptionPacketSwitchingDDoS Attack(DistributedDenial ofService)OpenSourceFirewallPersonallyIdentifiableInformation(PII)FreeSoftwareCreativeCommonsPacketComputerVirusByteRedundancyCitizenSciencePathSamplingRateFloatingPointWordIPAddressSamplingRougeAccessPointSymmetricEncryptionOpenAccessAntivirusSoftwarePhishingPublic KeyEncryptionIP(InternetProtocol)BinarySequenceBandwidthTCP(TransmissionControlProtocol)EncryptionDigitalDivideMalwareAcomputernetworkKeyloggingSoftwareTheCloudRouterWidthLossyCompressionSSL/TLS(securesocketslayer/transportlayer security)ISPComputingInnovationCrowdsourcingScalabilityInternetLosslessCompressionAcomputingdeviceFaultToleranceCertificateAuthorities

Unit 4 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
  1. Analog
  2. Protocol
  3. World Wide Web
  4. A computing system
  5. Routing
  6. Decryption
  7. Packet Switching
  8. DDoS Attack (Distributed Denial of Service)
  9. Open Source
  10. Firewall
  11. Personally Identifiable Information (PII)
  12. Free Software
  13. Creative Commons
  14. Packet
  15. Computer Virus
  16. Byte
  17. Redundancy
  18. Citizen Science
  19. Path
  20. Sampling Rate
  21. Floating Point
  22. Word
  23. IP Address
  24. Sampling
  25. Rouge Access Point
  26. Symmetric Encryption
  27. Open Access
  28. Antivirus Software
  29. Phishing
  30. Public Key Encryption
  31. IP (Internet Protocol)
  32. Binary Sequence
  33. Bandwidth
  34. TCP (Transmission Control Protocol)
  35. Encryption
  36. Digital Divide
  37. Malware
  38. A computer network
  39. Keylogging Software
  40. The Cloud
  41. Router
  42. Width
  43. Lossy Compression
  44. SSL/TLS (secure sockets layer/transport layer security)
  45. ISP
  46. Computing Innovation
  47. Crowdsourcing
  48. Scalability
  49. Internet
  50. Lossless Compression
  51. A computing device
  52. Fault Tolerance
  53. Certificate Authorities