CybercriminalsProofreadFraudExpertiseDataprivacyComputerethicsHackersInternetthreatsNetworkRansomCybersexDatainterferenceIllegalaccessOfflineComputerforgerySpamInformationElectronictheftDomainPhishingChildpornographySlangWormsVirtualrealityCopyrightholderSpoofingCyberTrojanhorsesNetiquetteGoldenruleTexttalkOnlineFlamewarsMalwareSpywarePharmingPiracyCopyrightinfringementPlagiarismViewpointsWifieavesdroppingReclusiontemporalRansomwareVirtualworldVirtualselfSafetyMisuseofdevicesCriminalactivitiesLockscreenransomwareAdwareCyberdefamationIllegaldownloadingTechnologyOnlinefraudPrivacyCopyrightComputeraddictionSysteminterferenceHackingCybercrimesComputerVirusesCyberbullyingEncryptionransomwareViolationNetworketiquetteIllegalinterceptionScreamingComputervirusesCyberspaceCybercriminalsProofreadFraudExpertiseDataprivacyComputerethicsHackersInternetthreatsNetworkRansomCybersexDatainterferenceIllegalaccessOfflineComputerforgerySpamInformationElectronictheftDomainPhishingChildpornographySlangWormsVirtualrealityCopyrightholderSpoofingCyberTrojanhorsesNetiquetteGoldenruleTexttalkOnlineFlamewarsMalwareSpywarePharmingPiracyCopyrightinfringementPlagiarismViewpointsWifieavesdroppingReclusiontemporalRansomwareVirtualworldVirtualselfSafetyMisuseofdevicesCriminalactivitiesLockscreenransomwareAdwareCyberdefamationIllegaldownloadingTechnologyOnlinefraudPrivacyCopyrightComputeraddictionSysteminterferenceHackingCybercrimesComputerVirusesCyberbullyingEncryptionransomwareViolationNetworketiquetteIllegalinterceptionScreamingComputervirusesCyberspace

IT BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
  1. Cybercriminals
  2. Proofread
  3. Fraud
  4. Expertise
  5. Data privacy
  6. Computer ethics
  7. Hackers
  8. Internet threats
  9. Network
  10. Ransom
  11. Cybersex
  12. Data interference
  13. Illegal access
  14. Offline
  15. Computer forgery
  16. Spam
  17. Information
  18. Electronic theft
  19. Domain
  20. Phishing
  21. Child pornography
  22. Slang
  23. Worms
  24. Virtual reality
  25. Copyright holder
  26. Spoofing
  27. Cyber
  28. Trojan horses
  29. Netiquette
  30. Golden rule
  31. Text talk
  32. Online
  33. Flame wars
  34. Malware
  35. Spyware
  36. Pharming
  37. Piracy
  38. Copyright infringement
  39. Plagiarism
  40. Viewpoints
  41. Wifi eavesdropping
  42. Reclusion temporal
  43. Ransomware
  44. Virtual world
  45. Virtual self
  46. Safety
  47. Misuse of devices
  48. Criminal activities
  49. Lockscreen ransomware
  50. Adware
  51. Cyber defamation
  52. Illegal downloading
  53. Technology
  54. Online fraud
  55. Privacy
  56. Copyright
  57. Computer addiction
  58. System interference
  59. Hacking
  60. Cybercrimes
  61. Computer
  62. Viruses
  63. Cyberbullying
  64. Encryption ransomware
  65. Violation
  66. Network etiquette
  67. Illegal interception
  68. Screaming
  69. Computer viruses
  70. Cyberspace