LiabilityAugmentedRealityHybridcloudBig DataAnalyticsSocialBehaviorProjectManagementITOrganizationallevelVirtualIdentityAutomationInternetofThingsPlagiarismWorkEnvironmentDeviceIndependenceMulticloudSmartAppliancesDecentralizedITDepartmentWirelessTechnologyPersonalPrivacyCentralizedGlobalAccessVirtualRealityLargeStorageDigitalTransformationCloudComputingTechnologyScoutingCopyrightInterconnectionUserDevelopmentTradeSecretsComputerLiteracyEthics CybersecurityHarmfulActionsLiabilityAugmentedRealityHybridcloudBig DataAnalyticsSocialBehaviorProjectManagementITOrganizationallevelVirtualIdentityAutomationInternetofThingsPlagiarismWorkEnvironmentDeviceIndependenceMulticloudSmartAppliancesDecentralizedITDepartmentWirelessTechnologyPersonalPrivacyCentralizedGlobalAccessVirtualRealityLargeStorageDigitalTransformationCloudComputingTechnologyScoutingCopyrightInterconnectionUserDevelopmentTradeSecretsComputerLiteracyEthics CybersecurityHarmfulActions

IT TRENDS, ISSUES AND CHALLENGES BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
B
3
N
4
B
5
O
6
G
7
G
8
I
9
G
10
B
11
O
12
I
13
B
14
I
15
B
16
N
17
N
18
G
19
O
20
N
21
G
22
B
23
O
24
G
25
I
26
O
27
O
28
N
29
I
30
I
31
I
32
O
33
G
34
N
  1. B-Liability
  2. B-Augmented Reality
  3. N-Hybrid cloud
  4. B-Big Data Analytics
  5. O-Social Behavior
  6. G-Project Management
  7. G-IT Organizational level
  8. I-Virtual Identity
  9. G-Automation
  10. B-Internet of Things
  11. O-Plagiarism
  12. I-Work Environment
  13. B-Device Independence
  14. I-Multicloud
  15. B-Smart Appliances
  16. N-Decentralized
  17. N-IT Department
  18. G-Wireless Technology
  19. O-Personal Privacy
  20. N-Centralized
  21. G-Global Access
  22. B-Virtual Reality
  23. O-Large Storage
  24. G-Digital Transformation
  25. I-Cloud Computing
  26. O-Technology Scouting
  27. O-Copyright
  28. N-Interconnection
  29. I-User Development
  30. I-Trade Secrets
  31. I-Computer Literacy
  32. O-Ethics
  33. G-Cybersecurity
  34. N-Harmful Actions