AlgorithmEventListenerConcatenateBinarySearchRandomSubstitutionCipherPeer-to-PeerNetworksBinaryByteAbstratctionReturnValueSelectionIterateRouterConditionalsRound-offLinearSearchArrayLow LevelPrg.LanguageCallbackFunctionDigitalDivideLossyLibraryMoore'sLawForLoopReasonable-timeCaesarCipherCreativeCommonsCrowdsourcingOverflowGlobalVariableHeuristicSequencingPixelUndecidableCloudComputingLosslessAPIDataTypeASCIIWhileLoopDDoSAttackMetadataPhishingScamOpenAccessCitizenScienceNotreseasonabletimeHighLevel Prg.LanguageNetworkRedundancyFunctionAlgorithmEventListenerConcatenateBinarySearchRandomSubstitutionCipherPeer-to-PeerNetworksBinaryByteAbstratctionReturnValueSelectionIterateRouterConditionalsRound-offLinearSearchArrayLow LevelPrg.LanguageCallbackFunctionDigitalDivideLossyLibraryMoore'sLawForLoopReasonable-timeCaesarCipherCreativeCommonsCrowdsourcingOverflowGlobalVariableHeuristicSequencingPixelUndecidableCloudComputingLosslessAPIDataTypeASCIIWhileLoopDDoSAttackMetadataPhishingScamOpenAccessCitizenScienceNotreseasonabletimeHighLevel Prg.LanguageNetworkRedundancyFunction

AP Computer Science Bingo - Ms. Garvin - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
N
3
B
4
G
5
N
6
I
7
O
8
I
9
N
10
O
11
I
12
B
13
I
14
I
15
I
16
I
17
G
18
I
19
I
20
N
21
N
22
O
23
B
24
B
25
N
26
G
27
G
28
N
29
B
30
O
31
O
32
B
33
N
34
B
35
I
36
G
37
O
38
G
39
G
40
N
41
O
42
O
43
B
44
O
45
B
46
G
47
O
48
B
49
G
  1. G-Algorithm
  2. N-Event Listener
  3. B-Concatenate
  4. G-Binary Search
  5. N-Random Substitution Cipher
  6. I-Peer-to-Peer Networks
  7. O-Binary
  8. I-Byte
  9. N-Abstratction
  10. O-Return Value
  11. I-Selection
  12. B-Iterate
  13. I-Router
  14. I-Conditionals
  15. I-Round-off
  16. I-Linear Search
  17. G-Array
  18. I-Low Level Prg. Language
  19. I-Callback Function
  20. N-Digital Divide
  21. N-Lossy
  22. O-Library
  23. B-Moore's Law
  24. B-For Loop
  25. N-Reasonable-time
  26. G-Caesar Cipher
  27. G-Creative Commons
  28. N-Crowdsourcing
  29. B-Overflow
  30. O-Global Variable
  31. O-Heuristic
  32. B-Sequencing
  33. N-Pixel
  34. B-Undecidable
  35. I-Cloud Computing
  36. G-Lossless
  37. O-API
  38. G-Data Type
  39. G-ASCII
  40. N-While Loop
  41. O-DDoS Attack
  42. O-Metadata
  43. B-Phishing Scam
  44. O-Open Access
  45. B-Citizen Science
  46. G-Not reseasonable time
  47. O-High Level Prg. Language
  48. B-Network Redundancy
  49. G-Function