tracedforgerysizingforgerycrimewarecybercrimeexemplarcounter-feitingphishingindividualcharacter-isticscopyrightdiacriticshackingvirusbackhandwritingmalwareobliterateindentationsblindforgerypiracycomputerforensicssimulatedforgeryclasscharacter-isticswatermarkwormtracedforgerysizingforgerycrimewarecybercrimeexemplarcounter-feitingphishingindividualcharacter-isticscopyrightdiacriticshackingvirusbackhandwritingmalwareobliterateindentationsblindforgerypiracycomputerforensicssimulatedforgeryclasscharacter-isticswatermarkworm

Chapter 16 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. traced forgery
  2. sizing
  3. forgery
  4. crimeware
  5. cybercrime
  6. exemplar
  7. counter-feiting
  8. phishing
  9. individual character-istics
  10. copyright
  11. diacritics
  12. hacking
  13. virus
  14. backhand writing
  15. malware
  16. obliterate
  17. indentations
  18. blind forgery
  19. piracy
  20. computer forensics
  21. simulated forgery
  22. class character-istics
  23. watermark
  24. worm