ConditionalsPhishingScamCreativeCommonsNetworkRedundancyCallbackFunctionMetadataNotreseasonabletimeUndecidableLinearSearchCitizenScienceCrowdsourcingEventListenerFunctionRound-offAPIWhileLoopLow LevelPrg.LanguageMoore'sLawCaesarCipherBinarySearchGlobalVariableSequencingRandomSubstitutionCipherOpenAccessIterateRouterHighLevel Prg.LanguageReasonable-timeOverflowPeer-to-PeerNetworksDataTypeDDoSAttackLibraryPixelDigitalDivideByteConcatenateCloudComputingLossyHeuristicReturnValueAbstratctionBinaryASCIIArrayForLoopLosslessSelectionAlgorithmConditionalsPhishingScamCreativeCommonsNetworkRedundancyCallbackFunctionMetadataNotreseasonabletimeUndecidableLinearSearchCitizenScienceCrowdsourcingEventListenerFunctionRound-offAPIWhileLoopLow LevelPrg.LanguageMoore'sLawCaesarCipherBinarySearchGlobalVariableSequencingRandomSubstitutionCipherOpenAccessIterateRouterHighLevel Prg.LanguageReasonable-timeOverflowPeer-to-PeerNetworksDataTypeDDoSAttackLibraryPixelDigitalDivideByteConcatenateCloudComputingLossyHeuristicReturnValueAbstratctionBinaryASCIIArrayForLoopLosslessSelectionAlgorithm

AP Computer Science Bingo - Ms. Garvin - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
B
3
G
4
B
5
I
6
O
7
G
8
B
9
I
10
B
11
N
12
N
13
G
14
I
15
O
16
N
17
I
18
B
19
G
20
G
21
O
22
B
23
N
24
O
25
B
26
I
27
O
28
N
29
B
30
I
31
G
32
O
33
O
34
N
35
N
36
I
37
B
38
I
39
N
40
O
41
O
42
N
43
O
44
G
45
G
46
B
47
G
48
I
49
G
  1. I-Conditionals
  2. B-Phishing Scam
  3. G-Creative Commons
  4. B-Network Redundancy
  5. I-Callback Function
  6. O-Metadata
  7. G-Not reseasonable time
  8. B-Undecidable
  9. I-Linear Search
  10. B-Citizen Science
  11. N-Crowdsourcing
  12. N-Event Listener
  13. G-Function
  14. I-Round-off
  15. O-API
  16. N-While Loop
  17. I-Low Level Prg. Language
  18. B-Moore's Law
  19. G-Caesar Cipher
  20. G-Binary Search
  21. O-Global Variable
  22. B-Sequencing
  23. N-Random Substitution Cipher
  24. O-Open Access
  25. B-Iterate
  26. I-Router
  27. O-High Level Prg. Language
  28. N-Reasonable-time
  29. B-Overflow
  30. I-Peer-to-Peer Networks
  31. G-Data Type
  32. O-DDoS Attack
  33. O-Library
  34. N-Pixel
  35. N-Digital Divide
  36. I-Byte
  37. B-Concatenate
  38. I-Cloud Computing
  39. N-Lossy
  40. O-Heuristic
  41. O-Return Value
  42. N-Abstratction
  43. O-Binary
  44. G-ASCII
  45. G-Array
  46. B-For Loop
  47. G-Lossless
  48. I-Selection
  49. G-Algorithm