Open Source Software World Wide Web DDoS Attack Domain Name System Creative Common License HTML Byte Packets Phishing Attack RoundOff Lossless Compression Fault Tolerance Digital Divide Asymmetric Encryption Internet Transmission Control Protocol Lossy Compression IP Address Decryption Public Domain Router Citizen Science Symmetric Ecryption User Datagram protocol Cookie Data Rogue Access Point Multifactor Authentication Overflow Encryption DNS Spoofing Open Source Software World Wide Web DDoS Attack Domain Name System Creative Common License HTML Byte Packets Phishing Attack RoundOff Lossless Compression Fault Tolerance Digital Divide Asymmetric Encryption Internet Transmission Control Protocol Lossy Compression IP Address Decryption Public Domain Router Citizen Science Symmetric Ecryption User Datagram protocol Cookie Data Rogue Access Point Multifactor Authentication Overflow Encryption DNS Spoofing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Open Source Software
World Wide Web
DDoS Attack
Domain Name System
Creative Common License
HTML
Byte
Packets
Phishing Attack
RoundOff
Lossless Compression
Fault Tolerance
Digital Divide
Asymmetric Encryption
Internet
Transmission Control Protocol
Lossy Compression
IP Address
Decryption
Public Domain
Router
Citizen Science
Symmetric Ecryption
User Datagram protocol
Cookie Data
Rogue Access Point
Multifactor Authentication
Overflow
Encryption
DNS Spoofing