OpenAccessRouterMoore'sLawCitizenScienceCloudComputingLosslessMetadataCallbackFunctionSelectionNotreseasonabletimeDigitalDivideLow LevelPrg.LanguagePhishingScamSequencingIterateBinaryForLoopNetworkRedundancyFunctionLossyHeuristicReasonable-timeEventListenerConcatenatePeer-to-PeerNetworksByteLibraryDataTypeCreativeCommonsAlgorithmReturnValueDDoSAttackLinearSearchASCIIPixelArrayAPIRound-offRandomSubstitutionCipherGlobalVariableConditionalsOverflowCaesarCipherHighLevel Prg.LanguageCrowdsourcingAbstratctionBinarySearchWhileLoopUndecidableOpenAccessRouterMoore'sLawCitizenScienceCloudComputingLosslessMetadataCallbackFunctionSelectionNotreseasonabletimeDigitalDivideLow LevelPrg.LanguagePhishingScamSequencingIterateBinaryForLoopNetworkRedundancyFunctionLossyHeuristicReasonable-timeEventListenerConcatenatePeer-to-PeerNetworksByteLibraryDataTypeCreativeCommonsAlgorithmReturnValueDDoSAttackLinearSearchASCIIPixelArrayAPIRound-offRandomSubstitutionCipherGlobalVariableConditionalsOverflowCaesarCipherHighLevel Prg.LanguageCrowdsourcingAbstratctionBinarySearchWhileLoopUndecidable

AP Computer Science Bingo - Ms. Garvin - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
O
2
I
3
B
4
B
5
I
6
G
7
O
8
I
9
I
10
G
11
N
12
I
13
B
14
B
15
B
16
O
17
B
18
B
19
G
20
N
21
O
22
N
23
N
24
B
25
I
26
I
27
O
28
G
29
G
30
G
31
O
32
O
33
I
34
G
35
N
36
G
37
O
38
I
39
N
40
O
41
I
42
B
43
G
44
O
45
N
46
N
47
G
48
N
49
B
  1. O-Open Access
  2. I-Router
  3. B-Moore's Law
  4. B-Citizen Science
  5. I-Cloud Computing
  6. G-Lossless
  7. O-Metadata
  8. I-Callback Function
  9. I-Selection
  10. G-Not reseasonable time
  11. N-Digital Divide
  12. I-Low Level Prg. Language
  13. B-Phishing Scam
  14. B-Sequencing
  15. B-Iterate
  16. O-Binary
  17. B-For Loop
  18. B-Network Redundancy
  19. G-Function
  20. N-Lossy
  21. O-Heuristic
  22. N-Reasonable-time
  23. N-Event Listener
  24. B-Concatenate
  25. I-Peer-to-Peer Networks
  26. I-Byte
  27. O-Library
  28. G-Data Type
  29. G-Creative Commons
  30. G-Algorithm
  31. O-Return Value
  32. O-DDoS Attack
  33. I-Linear Search
  34. G-ASCII
  35. N-Pixel
  36. G-Array
  37. O-API
  38. I-Round-off
  39. N-Random Substitution Cipher
  40. O-Global Variable
  41. I-Conditionals
  42. B-Overflow
  43. G-Caesar Cipher
  44. O-High Level Prg. Language
  45. N-Crowdsourcing
  46. N-Abstratction
  47. G-Binary Search
  48. N-While Loop
  49. B-Undecidable