SpywareE-mailbombSYNfloodLoginReplayWEPTrojanActiveXStructuredAdwareWPAMan-in-the-middlevirusDataPhysicalBIOSDDoSSpoofingUnstructuredJavawormWPA2LEAPExternalPhishingInternalPing ofdeathSecurityofbackupsMACAddressFilteringLoginGraywareJavaScriptSpamStorageofbackupsSecurityofbackupsSpywareE-mailbombSYNfloodLoginReplayWEPTrojanActiveXStructuredAdwareWPAMan-in-the-middlevirusDataPhysicalBIOSDDoSSpoofingUnstructuredJavawormWPA2LEAPExternalPhishingInternalPing ofdeathSecurityofbackupsMACAddressFilteringLoginGraywareJavaScriptSpamStorageofbackupsSecurityofbackups

Cristina's Bingo Game :D - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
  1. Spyware
  2. E-mail bomb
  3. SYN flood
  4. Login
  5. Replay
  6. WEP
  7. Trojan
  8. ActiveX
  9. Structured
  10. Adware
  11. WPA
  12. Man-in-the-middle
  13. virus
  14. Data
  15. Physical
  16. BIOS
  17. DDoS
  18. Spoofing
  19. Unstructured
  20. Java
  21. worm
  22. WPA2
  23. LEAP
  24. External
  25. Phishing
  26. Internal
  27. Ping of death
  28. Security of backups
  29. MAC Address Filtering
  30. Login
  31. Grayware
  32. JavaScript
  33. Spam
  34. Storage of backups
  35. Security of backups