Portable Firewalls Computer Surge Zombies Compromised File Memory Stick Backdoor Spike Integrity Unauthorised Internet Malware Trojans Biometrics Electrical Memory Administrators Send Receive Hard drive Viruses Antivirus Flaw Unbootable Usernames Delete Secret Mischief Power Voltage Operating Guard Protect Information Hacker Security Worms Spammers Data Logic bombs Passwords Retrievable Threats Email Network Accidental Access Deliberate Author Devices Portable Firewalls Computer Surge Zombies Compromised File Memory Stick Backdoor Spike Integrity Unauthorised Internet Malware Trojans Biometrics Electrical Memory Administrators Send Receive Hard drive Viruses Antivirus Flaw Unbootable Usernames Delete Secret Mischief Power Voltage Operating Guard Protect Information Hacker Security Worms Spammers Data Logic bombs Passwords Retrievable Threats Email Network Accidental Access Deliberate Author Devices
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Portable
Firewalls
Computer
Surge
Zombies
Compromised
File
Memory Stick
Backdoor
Spike
Integrity
Unauthorised
Internet
Malware
Trojans
Biometrics
Electrical
Memory
Administrators
Send
Receive
Hard drive
Viruses
Antivirus
Flaw
Unbootable
Usernames
Delete
Secret
Mischief
Power
Voltage
Operating
Guard
Protect
Information
Hacker
Security
Worms
Spammers
Data
Logic bombs
Passwords
Retrievable
Threats
Email
Network
Accidental
Access
Deliberate
Author
Devices