ReferentialintegrityPhishingFirewallPeer-to-peerMetadataRecordDataredundancyIPaddressingSymmetricencryptionClockspeedInterruptDHCPProtocolPagingBustopologyDecompositionSimplexSerialtransmissionLogicgateLosslesscompressionForeignkeyHarvardarchitectureNormalisationAuthenticationSegmentationDNSFree!FieldAsymmetricencryptionPrimarystorageWANVonNeumannarchitectureEncryptionDiskthrashingStartopologyUnicodePacketCachememorySQLinjectionMACaddressALUProgramCounterCIRRelationshipVirusProxyserverPrimarykeyPipeliningHashingFirewallControlUnitUDPTCP/IPParalleltransmissionBiometricauthenticationFull-duplexAlgorithmAccumulatorTrojanCPUEntityACIDASCIIHalf-duplexLANFinitestatemachineBooleanalgebraWormClient-serverRegisterStatetransitiondiagramAbstractionISRLossycompressionTruthtableMARMDRMalwareHeuristicSecondarystorageVirtualmemoryReferentialintegrityPhishingFirewallPeer-to-peerMetadataRecordDataredundancyIPaddressingSymmetricencryptionClockspeedInterruptDHCPProtocolPagingBustopologyDecompositionSimplexSerialtransmissionLogicgateLosslesscompressionForeignkeyHarvardarchitectureNormalisationAuthenticationSegmentationDNSFree!FieldAsymmetricencryptionPrimarystorageWANVonNeumannarchitectureEncryptionDiskthrashingStartopologyUnicodePacketCachememorySQLinjectionMACaddressALUProgramCounterCIRRelationshipVirusProxyserverPrimarykeyPipeliningHashingFirewallControlUnitUDPTCP/IPParalleltransmissionBiometricauthenticationFull-duplexAlgorithmAccumulatorTrojanCPUEntityACIDASCIIHalf-duplexLANFinitestatemachineBooleanalgebraWormClient-serverRegisterStatetransitiondiagramAbstractionISRLossycompressionTruthtableMARMDRMalwareHeuristicSecondarystorageVirtualmemory

H446 Bingo - Paper 1 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
  1. Referential integrity
  2. Phishing
  3. Firewall
  4. Peer-to-peer
  5. Metadata
  6. Record
  7. Data redundancy
  8. IP addressing
  9. Symmetric encryption
  10. Clock speed
  11. Interrupt
  12. DHCP
  13. Protocol
  14. Paging
  15. Bus topology
  16. Decomposition
  17. Simplex
  18. Serial transmission
  19. Logic gate
  20. Lossless compression
  21. Foreign key
  22. Harvard architecture
  23. Normalisation
  24. Authentication
  25. Segmentation
  26. DNS
  27. Free!
  28. Field
  29. Asymmetric encryption
  30. Primary storage
  31. WAN
  32. Von Neumann architecture
  33. Encryption
  34. Disk thrashing
  35. Star topology
  36. Unicode
  37. Packet
  38. Cache memory
  39. SQL injection
  40. MAC address
  41. ALU
  42. Program Counter
  43. CIR
  44. Relationship
  45. Virus
  46. Proxy server
  47. Primary key
  48. Pipelining
  49. Hashing
  50. Firewall
  51. Control Unit
  52. UDP
  53. TCP/IP
  54. Parallel transmission
  55. Biometric authentication
  56. Full-duplex
  57. Algorithm
  58. Accumulator
  59. Trojan
  60. CPU
  61. Entity
  62. ACID
  63. ASCII
  64. Half-duplex
  65. LAN
  66. Finite state machine
  67. Boolean algebra
  68. Worm
  69. Client-server
  70. Register
  71. State transition diagram
  72. Abstraction
  73. ISR
  74. Lossy compression
  75. Truth table
  76. MAR
  77. MDR
  78. Malware
  79. Heuristic
  80. Secondary storage
  81. Virtual memory