PHISHING CLOUD TOPOLOGY PROTOCOL IP ADDRESS VIRUS FIREWALL NETWORK ETHERNET MODEM CLIENT SWITCH WIRELESS LAN WI- FI IP MAC SCAM MAC OS HUB ROUTER HYBRID TOPOLOGY FIBER OPTIC INTERNET OPERATING SYSTEM STAR TOPOLOGY PEER2PEER BUS TOPOLOGY NETWORK OPERATING SYSTEM DATA SERVER LINUX BANDWIDTH TROUBLE- SHOOTING CYBER SECURITY PHISHING CLOUD TOPOLOGY PROTOCOL IP ADDRESS VIRUS FIREWALL NETWORK ETHERNET MODEM CLIENT SWITCH WIRELESS LAN WI- FI IP MAC SCAM MAC OS HUB ROUTER HYBRID TOPOLOGY FIBER OPTIC INTERNET OPERATING SYSTEM STAR TOPOLOGY PEER2PEER BUS TOPOLOGY NETWORK OPERATING SYSTEM DATA SERVER LINUX BANDWIDTH TROUBLE- SHOOTING CYBER SECURITY
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
O-
PHISHING
O-
CLOUD
B-
TOPOLOGY
I-
PROTOCOL
B-IP ADDRESS
O-
VIRUS
N-
FIREWALL
G-
NETWORK
G-
ETHERNET
G-
MODEM
B-
CLIENT
I-
SWITCH
B-
WIRELESS
I-LAN
N-WI-FI
N-
IP MAC
G-
SCAM
B-
MAC OS
N-
HUB
O-ROUTER
G-
HYBRID
TOPOLOGY
O-
FIBER OPTIC
G-
INTERNET
I-
OPERATING SYSTEM
I-
STAR TOPOLOGY
N-
PEER2PEER
B-
BUS TOPOLOGY
G-
NETWORK
OPERATING
SYSTEM
O-
DATA
B-
SERVER
O-
LINUX
I-
BANDWIDTH
N-
TROUBLE-
SHOOTING
I-
CYBER
SECURITY