Low LevelPrg.LanguageCrowdsourcingSequencingBinaryPixelLosslessOverflowOpenAccessAbstratctionReturnValueNetworkRedundancyHighLevel Prg.LanguageRandomSubstitutionCipherSelectionHeuristicLibraryRound-offArrayNotreseasonabletimeUndecidableASCIICloudComputingCallbackFunctionDigitalDivideDDoSAttackReasonable-timeByteAlgorithmIterateDataTypePhishingScamMoore'sLawFunctionCaesarCipherEventListenerForLoopCitizenScienceLinearSearchAPIPeer-to-PeerNetworksConcatenateGlobalVariableBinarySearchMetadataConditionalsWhileLoopLossyRouterCreativeCommonsLow LevelPrg.LanguageCrowdsourcingSequencingBinaryPixelLosslessOverflowOpenAccessAbstratctionReturnValueNetworkRedundancyHighLevel Prg.LanguageRandomSubstitutionCipherSelectionHeuristicLibraryRound-offArrayNotreseasonabletimeUndecidableASCIICloudComputingCallbackFunctionDigitalDivideDDoSAttackReasonable-timeByteAlgorithmIterateDataTypePhishingScamMoore'sLawFunctionCaesarCipherEventListenerForLoopCitizenScienceLinearSearchAPIPeer-to-PeerNetworksConcatenateGlobalVariableBinarySearchMetadataConditionalsWhileLoopLossyRouterCreativeCommons

AP Computer Science Bingo - Ms. Garvin - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
N
3
B
4
O
5
N
6
G
7
B
8
O
9
N
10
O
11
B
12
O
13
N
14
I
15
O
16
O
17
I
18
G
19
G
20
B
21
G
22
I
23
I
24
N
25
O
26
N
27
I
28
G
29
B
30
G
31
B
32
B
33
G
34
G
35
N
36
B
37
B
38
I
39
O
40
I
41
B
42
O
43
G
44
O
45
I
46
N
47
N
48
I
49
G
  1. I-Low Level Prg. Language
  2. N-Crowdsourcing
  3. B-Sequencing
  4. O-Binary
  5. N-Pixel
  6. G-Lossless
  7. B-Overflow
  8. O-Open Access
  9. N-Abstratction
  10. O-Return Value
  11. B-Network Redundancy
  12. O-High Level Prg. Language
  13. N-Random Substitution Cipher
  14. I-Selection
  15. O-Heuristic
  16. O-Library
  17. I-Round-off
  18. G-Array
  19. G-Not reseasonable time
  20. B-Undecidable
  21. G-ASCII
  22. I-Cloud Computing
  23. I-Callback Function
  24. N-Digital Divide
  25. O-DDoS Attack
  26. N-Reasonable-time
  27. I-Byte
  28. G-Algorithm
  29. B-Iterate
  30. G-Data Type
  31. B-Phishing Scam
  32. B-Moore's Law
  33. G-Function
  34. G-Caesar Cipher
  35. N-Event Listener
  36. B-For Loop
  37. B-Citizen Science
  38. I-Linear Search
  39. O-API
  40. I-Peer-to-Peer Networks
  41. B-Concatenate
  42. O-Global Variable
  43. G-Binary Search
  44. O-Metadata
  45. I-Conditionals
  46. N-While Loop
  47. N-Lossy
  48. I-Router
  49. G-Creative Commons