(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
G-belonging to a specific person
N-software that damages or disables a computer
G-software that enables a user to convert info
B-belonging to a specific person
B-a window that opens without your permission
O-belonging to a specific person
G-a person who uses a computer to gain unauthorized access
N-irrelevant or inappropriate messages
B-wireless phone
O-a window that opens without your permission
I-to come to an end
O-to copy data from one computer to to another
I-a person who uses a computer to gain unauthorized access
N-having great behavior while using electronics
G-a piece of code that is capable of corrupting data
B-a piece of code that is capable of corrupting data
B-to bully using an electronic device
G-to bully using an electronic device
O-a dishonest scheme
I-the correct way of communicating on the internet