Computer virus Schedule II drug Public order offense Drug- related crime Psychoactive substance Cyberspace Right- wing terrorists Software piracy Cybercrime Globalization Drug trafficking Drug offense Hacker Designer drugs Human smuggling Trafficking in persons Phishing DNA profiling Data encryption Left- wing terrorists Threat analysis Dangerous drug Ethnocentrism Schedule I drug Computer virus Schedule II drug Public order offense Drug- related crime Psychoactive substance Cyberspace Right- wing terrorists Software piracy Cybercrime Globalization Drug trafficking Drug offense Hacker Designer drugs Human smuggling Trafficking in persons Phishing DNA profiling Data encryption Left- wing terrorists Threat analysis Dangerous drug Ethnocentrism Schedule I drug
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Computer virus
Schedule II drug
Public order offense
Drug-related crime
Psychoactive substance
Cyberspace
Right-wing terrorists
Software piracy
Cybercrime
Globalization
Drug trafficking
Drug offense
Hacker
Designer drugs
Human smuggling
Trafficking in persons
Phishing
DNA profiling
Data encryption
Left-wing terrorists
Threat analysis
Dangerous drug
Ethnocentrism
Schedule I drug