PiracyCyberbullyingConnectDownloadMonitorDigitalAccountabilityProcessorHardwareFairUsePublicDomainPhisingSocialMediaSoftwareMalwareCopyrightNetiquetteAppsSafeguardInnovationComputerTechnologyEncryptionNetworkPiracyCyberbullyingConnectDownloadMonitorDigitalAccountabilityProcessorHardwareFairUsePublicDomainPhisingSocialMediaSoftwareMalwareCopyrightNetiquetteAppsSafeguardInnovationComputerTechnologyEncryptionNetwork

Fundamentals of Computing - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Piracy
  2. Cyberbullying
  3. Connect
  4. Download
  5. Monitor
  6. Digital
  7. Accountability
  8. Processor
  9. Hardware
  10. Fair Use
  11. Public Domain
  12. Phising
  13. Social Media
  14. Software
  15. Malware
  16. Copyright
  17. Netiquette
  18. Apps
  19. Safeguard
  20. Innovation
  21. Computer
  22. Technology
  23. Encryption
  24. Network