Hacker Globalization Psychoactive substance Data encryption Computer virus Right- wing terrorists Software piracy Drug trafficking Phishing Dangerous drug Threat analysis Drug- related crime DNA profiling Public order offense Ethnocentrism Designer drugs Human smuggling Drug offense Cyberspace Cybercrime Left- wing terrorists Schedule I drug Trafficking in persons Schedule II drug Hacker Globalization Psychoactive substance Data encryption Computer virus Right- wing terrorists Software piracy Drug trafficking Phishing Dangerous drug Threat analysis Drug- related crime DNA profiling Public order offense Ethnocentrism Designer drugs Human smuggling Drug offense Cyberspace Cybercrime Left- wing terrorists Schedule I drug Trafficking in persons Schedule II drug
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Hacker
Globalization
Psychoactive substance
Data encryption
Computer virus
Right-wing terrorists
Software piracy
Drug trafficking
Phishing
Dangerous drug
Threat analysis
Drug-related crime
DNA profiling
Public order offense
Ethnocentrism
Designer drugs
Human smuggling
Drug offense
Cyberspace
Cybercrime
Left-wing terrorists
Schedule I drug
Trafficking in persons
Schedule II drug