LogoffRGBValuesCybersecuritySoftwareDebugBinaryBugAICodeLibrariesAttributionConditionalsProgramDataHardwareInternetProgramComputationalArtifactOutputDeviceDigitalToolsDebugInputDeviceHardwareSoftwareInputDeviceStoredInformationEventsRemixLoopDigitalCitizen /FootprintBugNestedLoopsUserDataHexadecimalCodeErrorPasswordDecomposeSoftwareTroubleshootDataVariablesLoopDecisionTreeEncryptionAlgorithmSequenceCybersecurityAttributionAlgorithmUserProtocolsTroubleshootSortAlgorithmFlowChartLoginInformationContributorsFunctionsAIComputationalToolsOutputDeviceSequenceNetworkPseudocodeAIComputingSystemHumanintelligenceConditionalDiagramProcessStrongPasswordHardwareLogoffRGBValuesCybersecuritySoftwareDebugBinaryBugAICodeLibrariesAttributionConditionalsProgramDataHardwareInternetProgramComputationalArtifactOutputDeviceDigitalToolsDebugInputDeviceHardwareSoftwareInputDeviceStoredInformationEventsRemixLoopDigitalCitizen /FootprintBugNestedLoopsUserDataHexadecimalCodeErrorPasswordDecomposeSoftwareTroubleshootDataVariablesLoopDecisionTreeEncryptionAlgorithmSequenceCybersecurityAttributionAlgorithmUserProtocolsTroubleshootSortAlgorithmFlowChartLoginInformationContributorsFunctionsAIComputationalToolsOutputDeviceSequenceNetworkPseudocodeAIComputingSystemHumanintelligenceConditionalDiagramProcessStrongPasswordHardware

6-8 Computer Science & AI Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
  1. Log off
  2. RGB Values
  3. Cybersecurity
  4. Software
  5. Debug
  6. Binary
  7. Bug
  8. AI
  9. Code Libraries
  10. Attribution
  11. Conditionals
  12. Program
  13. Data
  14. Hardware
  15. Internet
  16. Program
  17. Computational Artifact
  18. Output Device
  19. Digital Tools
  20. Debug
  21. Input Device
  22. Hardware
  23. Software
  24. Input Device
  25. Stored Information
  26. Events
  27. Remix
  28. Loop
  29. Digital Citizen / Footprint
  30. Bug
  31. Nested Loops
  32. User
  33. Data
  34. Hexadecimal Code
  35. Error
  36. Password
  37. Decompose
  38. Software
  39. Troubleshoot
  40. Data
  41. Variables
  42. Loop
  43. Decision Tree
  44. Encryption
  45. Algorithm
  46. Sequence
  47. Cybersecurity
  48. Attribution
  49. Algorithm
  50. User
  51. Protocols
  52. Troubleshoot
  53. Sort
  54. Algorithm
  55. Flow Chart
  56. Login Information
  57. Contributors
  58. Functions
  59. AI
  60. Computational Tools
  61. Output Device
  62. Sequence
  63. Network
  64. Pseudocode
  65. AI
  66. Computing System
  67. Human intelligence
  68. Conditional
  69. Diagram
  70. Process
  71. Strong Password
  72. Hardware