Hacker Public order offense Dangerous drug Software piracy Cyberspace Computer virus Trafficking in persons Data encryption Human smuggling Ethnocentrism Threat analysis Schedule I drug Left- wing terrorists Phishing Globalization Schedule II drug Drug- related crime Cybercrime Drug offense Drug trafficking Right- wing terrorists DNA profiling Psychoactive substance Designer drugs Hacker Public order offense Dangerous drug Software piracy Cyberspace Computer virus Trafficking in persons Data encryption Human smuggling Ethnocentrism Threat analysis Schedule I drug Left- wing terrorists Phishing Globalization Schedule II drug Drug- related crime Cybercrime Drug offense Drug trafficking Right- wing terrorists DNA profiling Psychoactive substance Designer drugs
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Hacker
Public order offense
Dangerous drug
Software piracy
Cyberspace
Computer virus
Trafficking in persons
Data encryption
Human smuggling
Ethnocentrism
Threat analysis
Schedule I drug
Left-wing terrorists
Phishing
Globalization
Schedule II drug
Drug-related crime
Cybercrime
Drug offense
Drug trafficking
Right-wing terrorists
DNA profiling
Psychoactive substance
Designer drugs