BaseFileAddressCleanerVendorQAThorProdSourceRIDDeltaRIDPublicRecordsBuildProcesscsvfileDataDevelopmentParametersYellowBeltAttributeServerlesscomputingMdr.sourcetoolsLinkIdsBranchDedupTortoiseGITConfluenceDatalakeSoftwareengineerVisualStudioPayloadThorpatchEnablingPerformanceRollbackAzureHybridcloudSALTTransformTapeloadLinkingSortVirtualmachineNormalizeBooleanVPNCompliancetrainingCloudObjectivesdatasetLNCaresRisk &BusinessAnalyticsSyntaxErrorNameCleanerPercipioJiraRepositoryPRTEKeyPTOCodeReviewHPCCSystemsStrataFunctionVersionStatusReportORBITWhiteBeltLogicalFileDataInsightCherryPickSuperfileClusterPersistECLWatchWebinarRiskSolutionsPaaSSaaSLayoutStashPasswordCCPAKubernetesOutlookRollupWorkunitDistributeFull +DeltaHashData andScoringEngineeringDataReceivingDataOpsSprayKeysRoxieReleaseSecurityis ajourneyDenormalizeMergeRequestAutokeysQueryCodefreezeScrubsDatalandBaseFileAddressCleanerVendorQAThorProdSourceRIDDeltaRIDPublicRecordsBuildProcesscsvfileDataDevelopmentParametersYellowBeltAttributeServerlesscomputingMdr.sourcetoolsLinkIdsBranchDedupTortoiseGITConfluenceDatalakeSoftwareengineerVisualStudioPayloadThorpatchEnablingPerformanceRollbackAzureHybridcloudSALTTransformTapeloadLinkingSortVirtualmachineNormalizeBooleanVPNCompliancetrainingCloudObjectivesdatasetLNCaresRisk &BusinessAnalyticsSyntaxErrorNameCleanerPercipioJiraRepositoryPRTEKeyPTOCodeReviewHPCCSystemsStrataFunctionVersionStatusReportORBITWhiteBeltLogicalFileDataInsightCherryPickSuperfileClusterPersistECLWatchWebinarRiskSolutionsPaaSSaaSLayoutStashPasswordCCPAKubernetesOutlookRollupWorkunitDistributeFull +DeltaHashData andScoringEngineeringDataReceivingDataOpsSprayKeysRoxieReleaseSecurityis ajourneyDenormalizeMergeRequestAutokeysQueryCodefreezeScrubsDataland

Holiday Lunch Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
B
3
N
4
B
5
O
6
B
7
B
8
O
9
I
10
B
11
N
12
N
13
B
14
I
15
N
16
O
17
B
18
B
19
O
20
B
21
O
22
O
23
G
24
B
25
O
26
G
27
O
28
B
29
I
30
O
31
O
32
I
33
N
34
I
35
O
36
O
37
G
38
O
39
I
40
G
41
O
42
B
43
G
44
N
45
G
46
I
47
N
48
B
49
I
50
N
51
N
52
N
53
G
54
N
55
G
56
O
57
I
58
I
59
G
60
G
61
O
62
G
63
G
64
G
65
G
66
B
67
B
68
I
69
G
70
N
71
O
72
G
73
I
74
G
75
O
76
N
77
G
78
N
79
G
80
B
81
I
82
O
83
B
84
N
85
B
86
N
87
O
88
I
89
I
90
B
91
I
92
N
93
N
94
I
95
I
96
B
97
N
98
I
99
I
100
B
101
N
  1. G-Base File
  2. B-Address Cleaner
  3. N-Vendor
  4. B-QA
  5. O-ThorProd
  6. B-Source RID
  7. B-Delta RID
  8. O-Public Records
  9. I-Build Process
  10. B-csv file
  11. N-Data Development
  12. N-Parameters
  13. B-Yellow Belt
  14. I-Attribute
  15. N-Serverless computing
  16. O-Mdr.sourcetools
  17. B-LinkIds
  18. B-Branch
  19. O-Dedup
  20. B-Tortoise GIT
  21. O-Confluence
  22. O-Data lake
  23. G-Software engineer
  24. B-Visual Studio
  25. O-Payload
  26. G-Thor patch
  27. O-Enabling Performance
  28. B-Rollback
  29. I-Azure
  30. O-Hybrid cloud
  31. O-SALT
  32. I-Transform
  33. N-Tapeload
  34. I-Linking
  35. O-Sort
  36. O-Virtual machine
  37. G-Normalize
  38. O-Boolean
  39. I-VPN
  40. G-Compliance training
  41. O-Cloud
  42. B-Objectives
  43. G-dataset
  44. N-LN Cares
  45. G-Risk & Business Analytics
  46. I-Syntax Error
  47. N-Name Cleaner
  48. B-Percipio
  49. I-Jira
  50. N-
  51. N-Repository
  52. N-PRTE Key
  53. G-PTO
  54. N-Code Review
  55. G-HPCC Systems
  56. O-Strata
  57. I-
  58. I-Function
  59. G-Version
  60. G-Status Report
  61. O-ORBIT
  62. G-White Belt
  63. G-Logical File
  64. G-Data Insight
  65. G-Cherry Pick
  66. B-Superfile
  67. B-Cluster
  68. I-Persist
  69. G-ECL Watch
  70. N-Webinar
  71. O-Risk Solutions
  72. G-
  73. I-PaaS
  74. G-SaaS
  75. O-Layout
  76. N-Stash
  77. G-Password
  78. N-CCPA
  79. G-Kubernetes
  80. B-Outlook
  81. I-Rollup
  82. O-Workunit
  83. B-
  84. N-Distribute
  85. B-Full + Delta
  86. N-Hash
  87. O-
  88. I-Data and Scoring Engineering
  89. I-Data Receiving
  90. B-Data Ops
  91. I-Spray
  92. N-Keys
  93. N-Roxie Release
  94. I-Security is a journey
  95. I-Denormalize
  96. B-Merge Request
  97. N-Auto keys
  98. I-Query
  99. I-Code freeze
  100. B-Scrubs
  101. N-Dataland