FirewallMalwareSniffingBiometricsVirtualRealityTrojanHorseTrashingSpywareCrackerHackerLogicBombZombieSpamCyberspaceDomainnameWormBitcoinCyberterrorismEncryptionSpoofingURLPiracyISPHacktivismFirewallMalwareSniffingBiometricsVirtualRealityTrojanHorseTrashingSpywareCrackerHackerLogicBombZombieSpamCyberspaceDomainnameWormBitcoinCyberterrorismEncryptionSpoofingURLPiracyISPHacktivism

Chapter 17 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Firewall
  2. Malware
  3. Sniffing
  4. Biometrics
  5. Virtual Reality
  6. Trojan Horse
  7. Trashing
  8. Spyware
  9. Cracker
  10. Hacker
  11. Logic Bomb
  12. Zombie
  13. Spam
  14. Cyberspace
  15. Domain name
  16. Worm
  17. Bitcoin
  18. Cyber terrorism
  19. Encryption
  20. Spoofing
  21. URL
  22. Piracy
  23. ISP
  24. Hacktivism