HackingCyberExpertisePiracyVirtualrealityWormsCyberdefamationCopyrightOnlineTexttalkNetworkFlamewarsSlangCriminalactivitiesMalwareViolationSysteminterferenceSafetyVirtualselfComputerforgeryTrojanhorsesIllegaldownloadingIllegalaccessVirusesPrivacyOnlinefraudNetworketiquettePharmingComputervirusesPhishingCyberspaceComputerethicsIllegalinterceptionNetiquetteSpamDomainElectronictheftCyberbullyingReclusiontemporalDatainterferenceDataprivacyRansomTechnologyRansomwareComputerAdwareSpywareScreamingViewpointsChildpornographyPlagiarismGoldenruleOfflineCybercriminalsCopyrightholderInformationWifieavesdroppingProofreadCopyrightinfringementMisuseofdevicesSpoofingFraudComputeraddictionCybersexInternetthreatsHackersEncryptionransomwareCybercrimesLockscreenransomwareVirtualworldHackingCyberExpertisePiracyVirtualrealityWormsCyberdefamationCopyrightOnlineTexttalkNetworkFlamewarsSlangCriminalactivitiesMalwareViolationSysteminterferenceSafetyVirtualselfComputerforgeryTrojanhorsesIllegaldownloadingIllegalaccessVirusesPrivacyOnlinefraudNetworketiquettePharmingComputervirusesPhishingCyberspaceComputerethicsIllegalinterceptionNetiquetteSpamDomainElectronictheftCyberbullyingReclusiontemporalDatainterferenceDataprivacyRansomTechnologyRansomwareComputerAdwareSpywareScreamingViewpointsChildpornographyPlagiarismGoldenruleOfflineCybercriminalsCopyrightholderInformationWifieavesdroppingProofreadCopyrightinfringementMisuseofdevicesSpoofingFraudComputeraddictionCybersexInternetthreatsHackersEncryptionransomwareCybercrimesLockscreenransomwareVirtualworld

IT BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
  1. Hacking
  2. Cyber
  3. Expertise
  4. Piracy
  5. Virtual reality
  6. Worms
  7. Cyber defamation
  8. Copyright
  9. Online
  10. Text talk
  11. Network
  12. Flame wars
  13. Slang
  14. Criminal activities
  15. Malware
  16. Violation
  17. System interference
  18. Safety
  19. Virtual self
  20. Computer forgery
  21. Trojan horses
  22. Illegal downloading
  23. Illegal access
  24. Viruses
  25. Privacy
  26. Online fraud
  27. Network etiquette
  28. Pharming
  29. Computer viruses
  30. Phishing
  31. Cyberspace
  32. Computer ethics
  33. Illegal interception
  34. Netiquette
  35. Spam
  36. Domain
  37. Electronic theft
  38. Cyberbullying
  39. Reclusion temporal
  40. Data interference
  41. Data privacy
  42. Ransom
  43. Technology
  44. Ransomware
  45. Computer
  46. Adware
  47. Spyware
  48. Screaming
  49. Viewpoints
  50. Child pornography
  51. Plagiarism
  52. Golden rule
  53. Offline
  54. Cybercriminals
  55. Copyright holder
  56. Information
  57. Wifi eavesdropping
  58. Proofread
  59. Copyright infringement
  60. Misuse of devices
  61. Spoofing
  62. Fraud
  63. Computer addiction
  64. Cybersex
  65. Internet threats
  66. Hackers
  67. Encryption ransomware
  68. Cybercrimes
  69. Lockscreen ransomware
  70. Virtual world