HighLevel Prg.LanguageAlgorithmLossyAbstratctionCloudComputingCallbackFunctionReasonable-timeUndecidableASCIILosslessCitizenScienceMetadataReturnValueDataTypeForLoopOverflowRouterRound-offSequencingNetworkRedundancyConcatenateCreativeCommonsWhileLoopOpenAccessHeuristicNotreseasonabletimeCaesarCipherBytePixelGlobalVariableIterateLibraryPeer-to-PeerNetworksSelectionRandomSubstitutionCipherPhishingScamLow LevelPrg.LanguageBinaryBinarySearchMoore'sLawArrayCrowdsourcingFunctionDDoSAttackAPIDigitalDivideLinearSearchEventListenerConditionalsHighLevel Prg.LanguageAlgorithmLossyAbstratctionCloudComputingCallbackFunctionReasonable-timeUndecidableASCIILosslessCitizenScienceMetadataReturnValueDataTypeForLoopOverflowRouterRound-offSequencingNetworkRedundancyConcatenateCreativeCommonsWhileLoopOpenAccessHeuristicNotreseasonabletimeCaesarCipherBytePixelGlobalVariableIterateLibraryPeer-to-PeerNetworksSelectionRandomSubstitutionCipherPhishingScamLow LevelPrg.LanguageBinaryBinarySearchMoore'sLawArrayCrowdsourcingFunctionDDoSAttackAPIDigitalDivideLinearSearchEventListenerConditionals

AP Computer Science Bingo - Ms. Garvin - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
O
2
G
3
N
4
N
5
I
6
I
7
N
8
B
9
G
10
G
11
B
12
O
13
O
14
G
15
B
16
B
17
I
18
I
19
B
20
B
21
B
22
G
23
N
24
O
25
O
26
G
27
G
28
I
29
N
30
O
31
B
32
O
33
I
34
I
35
N
36
B
37
I
38
O
39
G
40
B
41
G
42
N
43
G
44
O
45
O
46
N
47
I
48
N
49
I
  1. O-High Level Prg. Language
  2. G-Algorithm
  3. N-Lossy
  4. N-Abstratction
  5. I-Cloud Computing
  6. I-Callback Function
  7. N-Reasonable-time
  8. B-Undecidable
  9. G-ASCII
  10. G-Lossless
  11. B-Citizen Science
  12. O-Metadata
  13. O-Return Value
  14. G-Data Type
  15. B-For Loop
  16. B-Overflow
  17. I-Router
  18. I-Round-off
  19. B-Sequencing
  20. B-Network Redundancy
  21. B-Concatenate
  22. G-Creative Commons
  23. N-While Loop
  24. O-Open Access
  25. O-Heuristic
  26. G-Not reseasonable time
  27. G-Caesar Cipher
  28. I-Byte
  29. N-Pixel
  30. O-Global Variable
  31. B-Iterate
  32. O-Library
  33. I-Peer-to-Peer Networks
  34. I-Selection
  35. N-Random Substitution Cipher
  36. B-Phishing Scam
  37. I-Low Level Prg. Language
  38. O-Binary
  39. G-Binary Search
  40. B-Moore's Law
  41. G-Array
  42. N-Crowdsourcing
  43. G-Function
  44. O-DDoS Attack
  45. O-API
  46. N-Digital Divide
  47. I-Linear Search
  48. N-Event Listener
  49. I-Conditionals