Drug offense Schedule II drug Phishing Threat analysis DNA profiling Schedule I drug Trafficking in persons Left- wing terrorists Software piracy Drug- related crime Right- wing terrorists Designer drugs Cybercrime Ethnocentrism Psychoactive substance Globalization Public order offense Human smuggling Cyberspace Computer virus Hacker Drug trafficking Dangerous drug Data encryption Drug offense Schedule II drug Phishing Threat analysis DNA profiling Schedule I drug Trafficking in persons Left- wing terrorists Software piracy Drug- related crime Right- wing terrorists Designer drugs Cybercrime Ethnocentrism Psychoactive substance Globalization Public order offense Human smuggling Cyberspace Computer virus Hacker Drug trafficking Dangerous drug Data encryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Drug offense
Schedule II drug
Phishing
Threat analysis
DNA profiling
Schedule I drug
Trafficking in persons
Left-wing terrorists
Software piracy
Drug-related crime
Right-wing terrorists
Designer drugs
Cybercrime
Ethnocentrism
Psychoactive substance
Globalization
Public order offense
Human smuggling
Cyberspace
Computer virus
Hacker
Drug trafficking
Dangerous drug
Data encryption