Malware thatresides in activememory andreplicates itselfover a network toinfect computersand devices.Copyrightedsoftware thatis distributedat no cost fora trial period.Destructiveevent orprank a viruswas createdto deliver.A programdesigned to makeusers moreproductive and/orassist them withpersonal tasks.The overlay ofinformation anddigital contenton top ofphysical objectsor locations.A program thatwarns or blocks auser frompotentiallyfraudulent orsuspiciouswebsites.A separate areaof a hard diskthat holds aninfected file untilthe infection canbe removed.A tool thatremoves aprogram as well asany associatedentries in thesystem files.Detects andprotects acomputer andits data fromunauthorizedintrusions.A programdesigned tomake usersmoreproductive.The process ofreorganizing ahard disk's file sothat the files arestored incontiguoussectors.A square-shapedcoded graphicthat correspondsto a web addressor otherinformation.An application thatenables designers tocreate sophisticatedpublications thatcontain text,graphics, and manycolors.Software thatprovides thecapabilities ofpaint software andmodification ofexisting graphics.A collectionof drawings,photos, andotherimages.A collection ofindividualapplicationsavailabletogether as aunit.Software thatdetermineswhere usersare spendingtheir money.A scam that sendsan official lookingemail messagesthat attempts toobtainfinanical/personalinformation.Malware that canhide and allowsomeone to takefull control of acomputer from aremote location.A program thatenables a userto performmaintenancetype tasks.Software thatcreates andanalyzes anindividual'stax forms.Software that isprovided for use,modification, andredistribution thathas norestrictions.A collection ofdata organizedto allow access,retrieval, anduse of data.An application thatassist professionalsand designers increating engineering,architectural, andscientific designs andmodels.Malware thatresides in activememory andreplicates itselfover a network toinfect computersand devices.Copyrightedsoftware thatis distributedat no cost fora trial period.Destructiveevent orprank a viruswas createdto deliver.A programdesigned to makeusers moreproductive and/orassist them withpersonal tasks.The overlay ofinformation anddigital contenton top ofphysical objectsor locations.A program thatwarns or blocks auser frompotentiallyfraudulent orsuspiciouswebsites.A separate areaof a hard diskthat holds aninfected file untilthe infection canbe removed.A tool thatremoves aprogram as well asany associatedentries in thesystem files.Detects andprotects acomputer andits data fromunauthorizedintrusions.A programdesigned tomake usersmoreproductive.The process ofreorganizing ahard disk's file sothat the files arestored incontiguoussectors.A square-shapedcoded graphicthat correspondsto a web addressor otherinformation.An application thatenables designers tocreate sophisticatedpublications thatcontain text,graphics, and manycolors.Software thatprovides thecapabilities ofpaint software andmodification ofexisting graphics.A collectionof drawings,photos, andotherimages.A collection ofindividualapplicationsavailabletogether as aunit.Software thatdetermineswhere usersare spendingtheir money.A scam that sendsan official lookingemail messagesthat attempts toobtainfinanical/personalinformation.Malware that canhide and allowsomeone to takefull control of acomputer from aremote location.A program thatenables a userto performmaintenancetype tasks.Software thatcreates andanalyzes anindividual'stax forms.Software that isprovided for use,modification, andredistribution thathas norestrictions.A collection ofdata organizedto allow access,retrieval, anduse of data.An application thatassist professionalsand designers increating engineering,architectural, andscientific designs andmodels.

Module 4: Programs and Applications - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Malware that resides in active memory and replicates itself over a network to infect computers and devices.
  2. Copyrighted software that is distributed at no cost for a trial period.
  3. Destructive event or prank a virus was created to deliver.
  4. A program designed to make users more productive and/or assist them with personal tasks.
  5. The overlay of information and digital content on top of physical objects or locations.
  6. A program that warns or blocks a user from potentially fraudulent or suspicious websites.
  7. A separate area of a hard disk that holds an infected file until the infection can be removed.
  8. A tool that removes a program as well as any associated entries in the system files.
  9. Detects and protects a computer and its data from unauthorized intrusions.
  10. A program designed to make users more productive.
  11. The process of reorganizing a hard disk's file so that the files are stored in contiguous sectors.
  12. A square-shaped coded graphic that corresponds to a web address or other information.
  13. An application that enables designers to create sophisticated publications that contain text, graphics, and many colors.
  14. Software that provides the capabilities of paint software and modification of existing graphics.
  15. A collection of drawings, photos, and other images.
  16. A collection of individual applications available together as a unit.
  17. Software that determines where users are spending their money.
  18. A scam that sends an official looking email messages that attempts to obtain finanical/personal information.
  19. Malware that can hide and allow someone to take full control of a computer from a remote location.
  20. A program that enables a user to perform maintenance type tasks.
  21. Software that creates and analyzes an individual's tax forms.
  22. Software that is provided for use, modification, and redistribution that has no restrictions.
  23. A collection of data organized to allow access, retrieval, and use of data.
  24. An application that assist professionals and designers in creating engineering, architectural, and scientific designs and models.