Designer drugs Computer virus Globalization Schedule II drug Phishing Drug trafficking Threat analysis Dangerous drug Right- wing terrorists Ethnocentrism Drug offense Data encryption Schedule I drug Human smuggling Hacker Left- wing terrorists Cybercrime Psychoactive substance Cyberspace Public order offense Drug- related crime Trafficking in persons DNA profiling Software piracy Designer drugs Computer virus Globalization Schedule II drug Phishing Drug trafficking Threat analysis Dangerous drug Right- wing terrorists Ethnocentrism Drug offense Data encryption Schedule I drug Human smuggling Hacker Left- wing terrorists Cybercrime Psychoactive substance Cyberspace Public order offense Drug- related crime Trafficking in persons DNA profiling Software piracy
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Designer drugs
Computer virus
Globalization
Schedule II drug
Phishing
Drug trafficking
Threat analysis
Dangerous drug
Right-wing terrorists
Ethnocentrism
Drug offense
Data encryption
Schedule I drug
Human smuggling
Hacker
Left-wing terrorists
Cybercrime
Psychoactive substance
Cyberspace
Public order offense
Drug-related crime
Trafficking in persons
DNA profiling
Software piracy