CybersexGoldenruleSafetyCopyrightholderCopyrightinfringementIllegalinterceptionComputerethicsRansomCyberspacePiracyExpertiseWormsEncryptionransomwareDataprivacyViolationViewpointsCyberOnlineComputerforgeryMisuseofdevicesCyberbullyingPlagiarismHackingIllegalaccessDomainCopyrightLockscreenransomwareSpywarePrivacyFlamewarsHackersInternetthreatsSlangCyberdefamationDatainterferenceRansomwarePharmingCybercriminalsNetworketiquetteTechnologyComputerProofreadNetiquetteNetworkSpamAdwareCybercrimesSysteminterferenceOfflineVirtualworldIllegaldownloadingSpoofingCriminalactivitiesElectronictheftMalwareChildpornographyPhishingTrojanhorsesVirtualselfWifieavesdroppingComputeraddictionOnlinefraudVirusesTexttalkFraudVirtualrealityScreamingInformationComputervirusesReclusiontemporalCybersexGoldenruleSafetyCopyrightholderCopyrightinfringementIllegalinterceptionComputerethicsRansomCyberspacePiracyExpertiseWormsEncryptionransomwareDataprivacyViolationViewpointsCyberOnlineComputerforgeryMisuseofdevicesCyberbullyingPlagiarismHackingIllegalaccessDomainCopyrightLockscreenransomwareSpywarePrivacyFlamewarsHackersInternetthreatsSlangCyberdefamationDatainterferenceRansomwarePharmingCybercriminalsNetworketiquetteTechnologyComputerProofreadNetiquetteNetworkSpamAdwareCybercrimesSysteminterferenceOfflineVirtualworldIllegaldownloadingSpoofingCriminalactivitiesElectronictheftMalwareChildpornographyPhishingTrojanhorsesVirtualselfWifieavesdroppingComputeraddictionOnlinefraudVirusesTexttalkFraudVirtualrealityScreamingInformationComputervirusesReclusiontemporal

IT BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
  1. Cybersex
  2. Golden rule
  3. Safety
  4. Copyright holder
  5. Copyright infringement
  6. Illegal interception
  7. Computer ethics
  8. Ransom
  9. Cyberspace
  10. Piracy
  11. Expertise
  12. Worms
  13. Encryption ransomware
  14. Data privacy
  15. Violation
  16. Viewpoints
  17. Cyber
  18. Online
  19. Computer forgery
  20. Misuse of devices
  21. Cyberbullying
  22. Plagiarism
  23. Hacking
  24. Illegal access
  25. Domain
  26. Copyright
  27. Lockscreen ransomware
  28. Spyware
  29. Privacy
  30. Flame wars
  31. Hackers
  32. Internet threats
  33. Slang
  34. Cyber defamation
  35. Data interference
  36. Ransomware
  37. Pharming
  38. Cybercriminals
  39. Network etiquette
  40. Technology
  41. Computer
  42. Proofread
  43. Netiquette
  44. Network
  45. Spam
  46. Adware
  47. Cybercrimes
  48. System interference
  49. Offline
  50. Virtual world
  51. Illegal downloading
  52. Spoofing
  53. Criminal activities
  54. Electronic theft
  55. Malware
  56. Child pornography
  57. Phishing
  58. Trojan horses
  59. Virtual self
  60. Wifi eavesdropping
  61. Computer addiction
  62. Online fraud
  63. Viruses
  64. Text talk
  65. Fraud
  66. Virtual reality
  67. Screaming
  68. Information
  69. Computer viruses
  70. Reclusion temporal