RegisterIPaddressingControlUnitHeuristicMalwareUDPCPUAsymmetricencryptionHashingStartopologyWormSegmentationPrimarystorageProgramCounterSymmetricencryptionLosslesscompressionDataredundancyPagingMDRLANTruthtableDHCPBiometricauthenticationLogicgateSerialtransmissionVonNeumannarchitectureUnicodeWANNormalisationPhishingPacketDNSFull-duplexPipeliningSQLinjectionISRClient-serverDiskthrashingFinitestatemachineReferentialintegrityDecompositionPrimarykeyHarvardarchitectureInterruptALUPeer-to-peerFirewallACIDTrojanFieldStatetransitiondiagramVirusBustopologyRecordTCP/IPFree!SecondarystorageAccumulatorAlgorithmCIRVirtualmemoryParalleltransmissionProtocolProxyserverSimplexCachememoryClockspeedBooleanalgebraRelationshipForeignkeyMetadataAuthenticationMARAbstractionMACaddressEncryptionFirewallLossycompressionEntityHalf-duplexASCIIRegisterIPaddressingControlUnitHeuristicMalwareUDPCPUAsymmetricencryptionHashingStartopologyWormSegmentationPrimarystorageProgramCounterSymmetricencryptionLosslesscompressionDataredundancyPagingMDRLANTruthtableDHCPBiometricauthenticationLogicgateSerialtransmissionVonNeumannarchitectureUnicodeWANNormalisationPhishingPacketDNSFull-duplexPipeliningSQLinjectionISRClient-serverDiskthrashingFinitestatemachineReferentialintegrityDecompositionPrimarykeyHarvardarchitectureInterruptALUPeer-to-peerFirewallACIDTrojanFieldStatetransitiondiagramVirusBustopologyRecordTCP/IPFree!SecondarystorageAccumulatorAlgorithmCIRVirtualmemoryParalleltransmissionProtocolProxyserverSimplexCachememoryClockspeedBooleanalgebraRelationshipForeignkeyMetadataAuthenticationMARAbstractionMACaddressEncryptionFirewallLossycompressionEntityHalf-duplexASCII

H446 Bingo - Paper 1 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
  1. Register
  2. IP addressing
  3. Control Unit
  4. Heuristic
  5. Malware
  6. UDP
  7. CPU
  8. Asymmetric encryption
  9. Hashing
  10. Star topology
  11. Worm
  12. Segmentation
  13. Primary storage
  14. Program Counter
  15. Symmetric encryption
  16. Lossless compression
  17. Data redundancy
  18. Paging
  19. MDR
  20. LAN
  21. Truth table
  22. DHCP
  23. Biometric authentication
  24. Logic gate
  25. Serial transmission
  26. Von Neumann architecture
  27. Unicode
  28. WAN
  29. Normalisation
  30. Phishing
  31. Packet
  32. DNS
  33. Full-duplex
  34. Pipelining
  35. SQL injection
  36. ISR
  37. Client-server
  38. Disk thrashing
  39. Finite state machine
  40. Referential integrity
  41. Decomposition
  42. Primary key
  43. Harvard architecture
  44. Interrupt
  45. ALU
  46. Peer-to-peer
  47. Firewall
  48. ACID
  49. Trojan
  50. Field
  51. State transition diagram
  52. Virus
  53. Bus topology
  54. Record
  55. TCP/IP
  56. Free!
  57. Secondary storage
  58. Accumulator
  59. Algorithm
  60. CIR
  61. Virtual memory
  62. Parallel transmission
  63. Protocol
  64. Proxy server
  65. Simplex
  66. Cache memory
  67. Clock speed
  68. Boolean algebra
  69. Relationship
  70. Foreign key
  71. Metadata
  72. Authentication
  73. MAR
  74. Abstraction
  75. MAC address
  76. Encryption
  77. Firewall
  78. Lossy compression
  79. Entity
  80. Half-duplex
  81. ASCII