Log off RGB Values Cybersecurity Software Debug Binary Bug AI Code Libraries Attribution Conditionals Program Data Hardware Internet Program Computational Artifact Output Device Digital Tools Debug Input Device Hardware Software Input Device Stored Information Events Remix Loop Digital Citizen / Footprint Bug Nested Loops User Data Hexadecimal Code Error Password Decompose Software Troubleshoot Data Variables Loop Decision Tree Encryption Algorithm Sequence Cybersecurity Attribution Algorithm User Protocols Troubleshoot Sort Algorithm Flow Chart Login Information Contributors Functions AI Computational Tools Output Device Sequence Network Pseudocode AI Computing System Human intelligence Conditional Diagram Process Strong Password Hardware Log off RGB Values Cybersecurity Software Debug Binary Bug AI Code Libraries Attribution Conditionals Program Data Hardware Internet Program Computational Artifact Output Device Digital Tools Debug Input Device Hardware Software Input Device Stored Information Events Remix Loop Digital Citizen / Footprint Bug Nested Loops User Data Hexadecimal Code Error Password Decompose Software Troubleshoot Data Variables Loop Decision Tree Encryption Algorithm Sequence Cybersecurity Attribution Algorithm User Protocols Troubleshoot Sort Algorithm Flow Chart Login Information Contributors Functions AI Computational Tools Output Device Sequence Network Pseudocode AI Computing System Human intelligence Conditional Diagram Process Strong Password Hardware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Log off
RGB Values
Cybersecurity
Software
Debug
Binary
Bug
AI
Code Libraries
Attribution
Conditionals
Program
Data
Hardware
Internet
Program
Computational Artifact
Output Device
Digital Tools
Debug
Input Device
Hardware
Software
Input Device
Stored Information
Events
Remix
Loop
Digital Citizen / Footprint
Bug
Nested Loops
User
Data
Hexadecimal Code
Error
Password
Decompose
Software
Troubleshoot
Data
Variables
Loop
Decision Tree
Encryption
Algorithm
Sequence
Cybersecurity
Attribution
Algorithm
User
Protocols
Troubleshoot
Sort
Algorithm
Flow Chart
Login Information
Contributors
Functions
AI
Computational Tools
Output Device
Sequence
Network
Pseudocode
AI
Computing System
Human intelligence
Conditional
Diagram
Process
Strong Password
Hardware