ProcessorTechnologyAccountabilityPhisingDigitalNetworkEncryptionFairUseMonitorMalwareDownloadSocialMediaInnovationCyberbullyingAppsComputerSoftwareNetiquetteConnectCopyrightPiracyHardwareSafeguardPublicDomainProcessorTechnologyAccountabilityPhisingDigitalNetworkEncryptionFairUseMonitorMalwareDownloadSocialMediaInnovationCyberbullyingAppsComputerSoftwareNetiquetteConnectCopyrightPiracyHardwareSafeguardPublicDomain

Fundamentals of Computing - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Processor
  2. Technology
  3. Accountability
  4. Phising
  5. Digital
  6. Network
  7. Encryption
  8. Fair Use
  9. Monitor
  10. Malware
  11. Download
  12. Social Media
  13. Innovation
  14. Cyberbullying
  15. Apps
  16. Computer
  17. Software
  18. Netiquette
  19. Connect
  20. Copyright
  21. Piracy
  22. Hardware
  23. Safeguard
  24. Public Domain