virusindentationswatermarkcopyrightblindforgerysizingwormdiacriticsobliteratecrimewarecybercrimepiracyhackingclasscharacter-isticsphishingexemplarcomputerforensicsmalwareindividualcharacter-isticsbackhandwritingsimulatedforgerycounter-feitingtracedforgeryforgeryvirusindentationswatermarkcopyrightblindforgerysizingwormdiacriticsobliteratecrimewarecybercrimepiracyhackingclasscharacter-isticsphishingexemplarcomputerforensicsmalwareindividualcharacter-isticsbackhandwritingsimulatedforgerycounter-feitingtracedforgeryforgery

Chapter 16 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. virus
  2. indentations
  3. watermark
  4. copyright
  5. blind forgery
  6. sizing
  7. worm
  8. diacritics
  9. obliterate
  10. crimeware
  11. cybercrime
  12. piracy
  13. hacking
  14. class character-istics
  15. phishing
  16. exemplar
  17. computer forensics
  18. malware
  19. individual character-istics
  20. backhand writing
  21. simulated forgery
  22. counter-feiting
  23. traced forgery
  24. forgery