presentation identity theft Windows 8 Application C2C what- if Robotics MIS smart card virus assisted Business expert primary computer- aided design external data sources language an auto mechanic intranet hardware the Internet text output management newsletters, brochures, & booklets White update data files as needed literacy word processing software displaced processing output presentation identity theft Windows 8 Application C2C what- if Robotics MIS smart card virus assisted Business expert primary computer- aided design external data sources language an auto mechanic intranet hardware the Internet text output management newsletters, brochures, & booklets White update data files as needed literacy word processing software displaced processing output
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
presentation
identity theft
Windows
8
Application
C2C
what-if
Robotics
MIS
smart card
virus
assisted
Business
expert
primary
computer-aided design
external data sources
language
an auto mechanic
intranet
hardware
the Internet
text output
management
newsletters, brochures, & booklets
White
update data files as needed
literacy
word processing software
displaced
processing
output