CreativeCommonsIterateMoore'sLawByteWhileLoopOpenAccessBinarySearchSelectionNotreseasonabletimeSequencingAlgorithmFunctionCitizenScienceHighLevel Prg.LanguageReturnValueRound-offConcatenateNetworkRedundancyForLoopDDoSAttackRandomSubstitutionCipherConditionalsHeuristicPixelLinearSearchLow LevelPrg.LanguageCloudComputingEventListenerDigitalDivideLosslessRouterCallbackFunctionPeer-to-PeerNetworksReasonable-timeASCIIAPIPhishingScamOverflowUndecidableMetadataAbstratctionArrayCaesarCipherLossyGlobalVariableLibraryBinaryCrowdsourcingDataTypeCreativeCommonsIterateMoore'sLawByteWhileLoopOpenAccessBinarySearchSelectionNotreseasonabletimeSequencingAlgorithmFunctionCitizenScienceHighLevel Prg.LanguageReturnValueRound-offConcatenateNetworkRedundancyForLoopDDoSAttackRandomSubstitutionCipherConditionalsHeuristicPixelLinearSearchLow LevelPrg.LanguageCloudComputingEventListenerDigitalDivideLosslessRouterCallbackFunctionPeer-to-PeerNetworksReasonable-timeASCIIAPIPhishingScamOverflowUndecidableMetadataAbstratctionArrayCaesarCipherLossyGlobalVariableLibraryBinaryCrowdsourcingDataType

AP Computer Science Bingo - Ms. Garvin - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
B
3
B
4
I
5
N
6
O
7
G
8
I
9
G
10
B
11
G
12
G
13
B
14
O
15
O
16
I
17
B
18
B
19
B
20
O
21
N
22
I
23
O
24
N
25
I
26
I
27
I
28
N
29
N
30
G
31
I
32
I
33
I
34
N
35
G
36
O
37
B
38
B
39
B
40
O
41
N
42
G
43
G
44
N
45
O
46
O
47
O
48
N
49
G
  1. G-Creative Commons
  2. B-Iterate
  3. B-Moore's Law
  4. I-Byte
  5. N-While Loop
  6. O-Open Access
  7. G-Binary Search
  8. I-Selection
  9. G-Not reseasonable time
  10. B-Sequencing
  11. G-Algorithm
  12. G-Function
  13. B-Citizen Science
  14. O-High Level Prg. Language
  15. O-Return Value
  16. I-Round-off
  17. B-Concatenate
  18. B-Network Redundancy
  19. B-For Loop
  20. O-DDoS Attack
  21. N-Random Substitution Cipher
  22. I-Conditionals
  23. O-Heuristic
  24. N-Pixel
  25. I-Linear Search
  26. I-Low Level Prg. Language
  27. I-Cloud Computing
  28. N-Event Listener
  29. N-Digital Divide
  30. G-Lossless
  31. I-Router
  32. I-Callback Function
  33. I-Peer-to-Peer Networks
  34. N-Reasonable-time
  35. G-ASCII
  36. O-API
  37. B-Phishing Scam
  38. B-Overflow
  39. B-Undecidable
  40. O-Metadata
  41. N-Abstratction
  42. G-Array
  43. G-Caesar Cipher
  44. N-Lossy
  45. O-Global Variable
  46. O-Library
  47. O-Binary
  48. N-Crowdsourcing
  49. G-Data Type