Digital Divide RoundOff World Wide Web Symmetric Ecryption DDoS Attack Decryption Transmission Control Protocol Open Source Software Creative Common License Phishing Attack Router Multifactor Authentication Asymmetric Encryption Lossless Compression Domain Name System Overflow Fault Tolerance User Datagram protocol Public Domain HTML Citizen Science Packets Encryption Cookie Data Rogue Access Point Byte DNS Spoofing Internet IP Address Lossy Compression Digital Divide RoundOff World Wide Web Symmetric Ecryption DDoS Attack Decryption Transmission Control Protocol Open Source Software Creative Common License Phishing Attack Router Multifactor Authentication Asymmetric Encryption Lossless Compression Domain Name System Overflow Fault Tolerance User Datagram protocol Public Domain HTML Citizen Science Packets Encryption Cookie Data Rogue Access Point Byte DNS Spoofing Internet IP Address Lossy Compression
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Digital Divide
RoundOff
World Wide Web
Symmetric Ecryption
DDoS Attack
Decryption
Transmission Control Protocol
Open Source Software
Creative Common License
Phishing Attack
Router
Multifactor Authentication
Asymmetric Encryption
Lossless Compression
Domain Name System
Overflow
Fault Tolerance
User Datagram protocol
Public Domain
HTML
Citizen Science
Packets
Encryption
Cookie Data
Rogue Access Point
Byte
DNS Spoofing
Internet
IP Address
Lossy Compression