Public Domain Multifactor Authentication Domain Name System Byte Lossless Compression IP Address Transmission Control Protocol Open Source Software Internet Router Overflow Citizen Science Decryption Phishing Attack Symmetric Ecryption Cookie Data Packets Encryption World Wide Web Rogue Access Point Lossy Compression DNS Spoofing Fault Tolerance DDoS Attack Digital Divide RoundOff User Datagram protocol Asymmetric Encryption HTML Creative Common License Public Domain Multifactor Authentication Domain Name System Byte Lossless Compression IP Address Transmission Control Protocol Open Source Software Internet Router Overflow Citizen Science Decryption Phishing Attack Symmetric Ecryption Cookie Data Packets Encryption World Wide Web Rogue Access Point Lossy Compression DNS Spoofing Fault Tolerance DDoS Attack Digital Divide RoundOff User Datagram protocol Asymmetric Encryption HTML Creative Common License
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Public Domain
Multifactor Authentication
Domain Name System
Byte
Lossless Compression
IP Address
Transmission Control Protocol
Open Source Software
Internet
Router
Overflow
Citizen Science
Decryption
Phishing Attack
Symmetric Ecryption
Cookie Data
Packets
Encryption
World Wide Web
Rogue Access Point
Lossy Compression
DNS Spoofing
Fault Tolerance
DDoS Attack
Digital Divide
RoundOff
User Datagram protocol
Asymmetric Encryption
HTML
Creative Common License