Code Libraries Digital Tools Nested Loops Output Device Computational Artifact Software Attribution Protocols Hardware AI Digital Citizen / Footprint Bug Debug Hexadecimal Code Computational Tools User Input Device Remix Computing System Hardware Software Network AI Troubleshoot Diagram Data Log off Data Decompose Process Encryption Algorithm Contributors Conditional Algorithm AI Program Cybersecurity Output Device Events Error Human intelligence User Cybersecurity Functions Internet Loop Sequence Sequence Strong Password Sort Input Device Program Troubleshoot Attribution Data Pseudocode Decision Tree Password Conditionals Hardware Software Login Information Binary Debug Bug Stored Information RGB Values Flow Chart Algorithm Variables Loop Code Libraries Digital Tools Nested Loops Output Device Computational Artifact Software Attribution Protocols Hardware AI Digital Citizen / Footprint Bug Debug Hexadecimal Code Computational Tools User Input Device Remix Computing System Hardware Software Network AI Troubleshoot Diagram Data Log off Data Decompose Process Encryption Algorithm Contributors Conditional Algorithm AI Program Cybersecurity Output Device Events Error Human intelligence User Cybersecurity Functions Internet Loop Sequence Sequence Strong Password Sort Input Device Program Troubleshoot Attribution Data Pseudocode Decision Tree Password Conditionals Hardware Software Login Information Binary Debug Bug Stored Information RGB Values Flow Chart Algorithm Variables Loop
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Code Libraries
Digital Tools
Nested Loops
Output Device
Computational Artifact
Software
Attribution
Protocols
Hardware
AI
Digital Citizen / Footprint
Bug
Debug
Hexadecimal Code
Computational Tools
User
Input Device
Remix
Computing System
Hardware
Software
Network
AI
Troubleshoot
Diagram
Data
Log off
Data
Decompose
Process
Encryption
Algorithm
Contributors
Conditional
Algorithm
AI
Program
Cybersecurity
Output Device
Events
Error
Human intelligence
User
Cybersecurity
Functions
Internet
Loop
Sequence
Sequence
Strong Password
Sort
Input Device
Program
Troubleshoot
Attribution
Data
Pseudocode
Decision Tree
Password
Conditionals
Hardware
Software
Login Information
Binary
Debug
Bug
Stored Information
RGB Values
Flow Chart
Algorithm
Variables
Loop