BinarySearchCallbackFunctionDataTypeRouterReasonable-timeASCIILow LevelPrg.LanguageLosslessRandomSubstitutionCipherAlgorithmForLoopByteCrowdsourcingCaesarCipherUndecidableMoore'sLawConcatenateCloudComputingLinearSearchSelectionPixelOpenAccessPeer-to-PeerNetworksArrayNetworkRedundancyEventListenerGlobalVariableDigitalDivideAPIRound-offSequencingLossyDDoSAttackFunctionIterateReturnValueConditionalsBinaryAbstratctionHeuristicOverflowHighLevel Prg.LanguageCitizenScienceNotreseasonabletimeCreativeCommonsMetadataLibraryWhileLoopPhishingScamBinarySearchCallbackFunctionDataTypeRouterReasonable-timeASCIILow LevelPrg.LanguageLosslessRandomSubstitutionCipherAlgorithmForLoopByteCrowdsourcingCaesarCipherUndecidableMoore'sLawConcatenateCloudComputingLinearSearchSelectionPixelOpenAccessPeer-to-PeerNetworksArrayNetworkRedundancyEventListenerGlobalVariableDigitalDivideAPIRound-offSequencingLossyDDoSAttackFunctionIterateReturnValueConditionalsBinaryAbstratctionHeuristicOverflowHighLevel Prg.LanguageCitizenScienceNotreseasonabletimeCreativeCommonsMetadataLibraryWhileLoopPhishingScam

AP Computer Science Bingo - Ms. Garvin - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
I
3
G
4
I
5
N
6
G
7
I
8
G
9
N
10
G
11
B
12
I
13
N
14
G
15
B
16
B
17
B
18
I
19
I
20
I
21
N
22
O
23
I
24
G
25
B
26
N
27
O
28
N
29
O
30
I
31
B
32
N
33
O
34
G
35
B
36
O
37
I
38
O
39
N
40
O
41
B
42
O
43
B
44
G
45
G
46
O
47
O
48
N
49
B
  1. G-Binary Search
  2. I-Callback Function
  3. G-Data Type
  4. I-Router
  5. N-Reasonable-time
  6. G-ASCII
  7. I-Low Level Prg. Language
  8. G-Lossless
  9. N-Random Substitution Cipher
  10. G-Algorithm
  11. B-For Loop
  12. I-Byte
  13. N-Crowdsourcing
  14. G-Caesar Cipher
  15. B-Undecidable
  16. B-Moore's Law
  17. B-Concatenate
  18. I-Cloud Computing
  19. I-Linear Search
  20. I-Selection
  21. N-Pixel
  22. O-Open Access
  23. I-Peer-to-Peer Networks
  24. G-Array
  25. B-Network Redundancy
  26. N-Event Listener
  27. O-Global Variable
  28. N-Digital Divide
  29. O-API
  30. I-Round-off
  31. B-Sequencing
  32. N-Lossy
  33. O-DDoS Attack
  34. G-Function
  35. B-Iterate
  36. O-Return Value
  37. I-Conditionals
  38. O-Binary
  39. N-Abstratction
  40. O-Heuristic
  41. B-Overflow
  42. O-High Level Prg. Language
  43. B-Citizen Science
  44. G-Not reseasonable time
  45. G-Creative Commons
  46. O-Metadata
  47. O-Library
  48. N-While Loop
  49. B-Phishing Scam