Multifactor Authentication Asymmetric Encryption Lossy Compression Internet User Datagram protocol Symmetric Ecryption HTML DNS Spoofing Transmission Control Protocol Encryption Creative Common License Decryption DDoS Attack World Wide Web Domain Name System Cookie Data IP Address Public Domain Phishing Attack Digital Divide Citizen Science Lossless Compression Byte Router Fault Tolerance RoundOff Overflow Open Source Software Packets Rogue Access Point Multifactor Authentication Asymmetric Encryption Lossy Compression Internet User Datagram protocol Symmetric Ecryption HTML DNS Spoofing Transmission Control Protocol Encryption Creative Common License Decryption DDoS Attack World Wide Web Domain Name System Cookie Data IP Address Public Domain Phishing Attack Digital Divide Citizen Science Lossless Compression Byte Router Fault Tolerance RoundOff Overflow Open Source Software Packets Rogue Access Point
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Multifactor Authentication
Asymmetric Encryption
Lossy Compression
Internet
User Datagram protocol
Symmetric Ecryption
HTML
DNS Spoofing
Transmission Control Protocol
Encryption
Creative Common License
Decryption
DDoS Attack
World Wide Web
Domain Name System
Cookie Data
IP Address
Public Domain
Phishing Attack
Digital Divide
Citizen Science
Lossless Compression
Byte
Router
Fault Tolerance
RoundOff
Overflow
Open Source Software
Packets
Rogue Access Point