MDRACIDPrimarykeyNormalisationProgramCounterFirewallUDPPrimarystorageEntitySimplexLogicgateALUSegmentationStatetransitiondiagramBustopologyLossycompressionIPaddressingControlUnitStartopologyTCP/IPHashingCachememoryASCIIHalf-duplexLANVirtualmemoryAccumulatorMalwareDataredundancyParalleltransmissionSecondarystorageSymmetricencryptionLosslesscompressionWANISRAsymmetricencryptionInterruptFieldSerialtransmissionUnicodePhishingCPUPipeliningEncryptionReferentialintegritySQLinjectionFinitestatemachineAbstractionMetadataAuthenticationMARTrojanFirewallAlgorithmTruthtableRegisterProtocolPagingClockspeedHeuristicPeer-to-peerWormVonNeumannarchitectureFree!DecompositionFull-duplexCIRForeignkeyHarvardarchitectureProxyserverBiometricauthenticationDNSClient-serverVirusRelationshipMACaddressRecordPacketDHCPBooleanalgebraDiskthrashingMDRACIDPrimarykeyNormalisationProgramCounterFirewallUDPPrimarystorageEntitySimplexLogicgateALUSegmentationStatetransitiondiagramBustopologyLossycompressionIPaddressingControlUnitStartopologyTCP/IPHashingCachememoryASCIIHalf-duplexLANVirtualmemoryAccumulatorMalwareDataredundancyParalleltransmissionSecondarystorageSymmetricencryptionLosslesscompressionWANISRAsymmetricencryptionInterruptFieldSerialtransmissionUnicodePhishingCPUPipeliningEncryptionReferentialintegritySQLinjectionFinitestatemachineAbstractionMetadataAuthenticationMARTrojanFirewallAlgorithmTruthtableRegisterProtocolPagingClockspeedHeuristicPeer-to-peerWormVonNeumannarchitectureFree!DecompositionFull-duplexCIRForeignkeyHarvardarchitectureProxyserverBiometricauthenticationDNSClient-serverVirusRelationshipMACaddressRecordPacketDHCPBooleanalgebraDiskthrashing

H446 Bingo - Paper 1 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
  1. MDR
  2. ACID
  3. Primary key
  4. Normalisation
  5. Program Counter
  6. Firewall
  7. UDP
  8. Primary storage
  9. Entity
  10. Simplex
  11. Logic gate
  12. ALU
  13. Segmentation
  14. State transition diagram
  15. Bus topology
  16. Lossy compression
  17. IP addressing
  18. Control Unit
  19. Star topology
  20. TCP/IP
  21. Hashing
  22. Cache memory
  23. ASCII
  24. Half-duplex
  25. LAN
  26. Virtual memory
  27. Accumulator
  28. Malware
  29. Data redundancy
  30. Parallel transmission
  31. Secondary storage
  32. Symmetric encryption
  33. Lossless compression
  34. WAN
  35. ISR
  36. Asymmetric encryption
  37. Interrupt
  38. Field
  39. Serial transmission
  40. Unicode
  41. Phishing
  42. CPU
  43. Pipelining
  44. Encryption
  45. Referential integrity
  46. SQL injection
  47. Finite state machine
  48. Abstraction
  49. Metadata
  50. Authentication
  51. MAR
  52. Trojan
  53. Firewall
  54. Algorithm
  55. Truth table
  56. Register
  57. Protocol
  58. Paging
  59. Clock speed
  60. Heuristic
  61. Peer-to-peer
  62. Worm
  63. Von Neumann architecture
  64. Free!
  65. Decomposition
  66. Full-duplex
  67. CIR
  68. Foreign key
  69. Harvard architecture
  70. Proxy server
  71. Biometric authentication
  72. DNS
  73. Client-server
  74. Virus
  75. Relationship
  76. MAC address
  77. Record
  78. Packet
  79. DHCP
  80. Boolean algebra
  81. Disk thrashing