Cyberspace Human smuggling Schedule II drug Threat analysis Ethnocentrism Drug offense Data encryption Left- wing terrorists Designer drugs Dangerous drug Computer virus Drug trafficking Drug- related crime Public order offense Hacker DNA profiling Phishing Schedule I drug Cybercrime Right- wing terrorists Trafficking in persons Globalization Software piracy Psychoactive substance Cyberspace Human smuggling Schedule II drug Threat analysis Ethnocentrism Drug offense Data encryption Left- wing terrorists Designer drugs Dangerous drug Computer virus Drug trafficking Drug- related crime Public order offense Hacker DNA profiling Phishing Schedule I drug Cybercrime Right- wing terrorists Trafficking in persons Globalization Software piracy Psychoactive substance
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cyberspace
Human smuggling
Schedule II drug
Threat analysis
Ethnocentrism
Drug offense
Data encryption
Left-wing terrorists
Designer drugs
Dangerous drug
Computer virus
Drug trafficking
Drug-related crime
Public order offense
Hacker
DNA profiling
Phishing
Schedule I drug
Cybercrime
Right-wing terrorists
Trafficking in persons
Globalization
Software piracy
Psychoactive substance