SpoofingScreamingDatainterferenceTechnologyCopyrightholderPiracyCyberAdwareMisuseofdevicesCyberbullyingNetworkComputerethicsIllegaldownloadingPrivacyMalwareRansomwareWormsLockscreenransomwareTexttalkCyberspaceFlamewarsOfflineChildpornographyPlagiarismRansomSlangSpywareComputerIllegalinterceptionElectronictheftSysteminterferenceCybercrimesPhishingCyberdefamationVirusesCybersexEncryptionransomwareExpertiseReclusiontemporalComputervirusesIllegalaccessVirtualworldHackersComputeraddictionNetiquetteSafetyHackingCopyrightOnlineVirtualselfDomainCybercriminalsViewpointsNetworketiquetteComputerforgeryPharmingWifieavesdroppingInternetthreatsTrojanhorsesViolationCriminalactivitiesInformationFraudVirtualrealityCopyrightinfringementSpamDataprivacyGoldenruleProofreadOnlinefraudSpoofingScreamingDatainterferenceTechnologyCopyrightholderPiracyCyberAdwareMisuseofdevicesCyberbullyingNetworkComputerethicsIllegaldownloadingPrivacyMalwareRansomwareWormsLockscreenransomwareTexttalkCyberspaceFlamewarsOfflineChildpornographyPlagiarismRansomSlangSpywareComputerIllegalinterceptionElectronictheftSysteminterferenceCybercrimesPhishingCyberdefamationVirusesCybersexEncryptionransomwareExpertiseReclusiontemporalComputervirusesIllegalaccessVirtualworldHackersComputeraddictionNetiquetteSafetyHackingCopyrightOnlineVirtualselfDomainCybercriminalsViewpointsNetworketiquetteComputerforgeryPharmingWifieavesdroppingInternetthreatsTrojanhorsesViolationCriminalactivitiesInformationFraudVirtualrealityCopyrightinfringementSpamDataprivacyGoldenruleProofreadOnlinefraud

IT BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
  1. Spoofing
  2. Screaming
  3. Data interference
  4. Technology
  5. Copyright holder
  6. Piracy
  7. Cyber
  8. Adware
  9. Misuse of devices
  10. Cyberbullying
  11. Network
  12. Computer ethics
  13. Illegal downloading
  14. Privacy
  15. Malware
  16. Ransomware
  17. Worms
  18. Lockscreen ransomware
  19. Text talk
  20. Cyberspace
  21. Flame wars
  22. Offline
  23. Child pornography
  24. Plagiarism
  25. Ransom
  26. Slang
  27. Spyware
  28. Computer
  29. Illegal interception
  30. Electronic theft
  31. System interference
  32. Cybercrimes
  33. Phishing
  34. Cyber defamation
  35. Viruses
  36. Cybersex
  37. Encryption ransomware
  38. Expertise
  39. Reclusion temporal
  40. Computer viruses
  41. Illegal access
  42. Virtual world
  43. Hackers
  44. Computer addiction
  45. Netiquette
  46. Safety
  47. Hacking
  48. Copyright
  49. Online
  50. Virtual self
  51. Domain
  52. Cybercriminals
  53. Viewpoints
  54. Network etiquette
  55. Computer forgery
  56. Pharming
  57. Wifi eavesdropping
  58. Internet threats
  59. Trojan horses
  60. Violation
  61. Criminal activities
  62. Information
  63. Fraud
  64. Virtual reality
  65. Copyright infringement
  66. Spam
  67. Data privacy
  68. Golden rule
  69. Proofread
  70. Online fraud