SpoofingNetworkElectronictheftRansomwarePrivacyVirtualrealityReclusiontemporalCybercrimesEncryptionransomwareCybersexWormsComputeraddictionRansomAdwareFlamewarsGoldenruleSlangSpamChildpornographyDomainOfflineNetworketiquetteHackingIllegalaccessFraudComputerforgeryProofreadPharmingCyberspaceLockscreenransomwareExpertiseWifieavesdroppingComputerethicsOnlineCyberVirtualworldTrojanhorsesPhishingCybercriminalsTexttalkViolationCopyrightinfringementSysteminterferenceComputerCriminalactivitiesSpywareVirtualselfMisuseofdevicesTechnologyMalwareHackersComputervirusesPiracyScreamingDatainterferenceInternetthreatsInformationCopyrightholderIllegalinterceptionCopyrightVirusesSafetyCyberdefamationViewpointsNetiquettePlagiarismDataprivacyOnlinefraudCyberbullyingIllegaldownloadingSpoofingNetworkElectronictheftRansomwarePrivacyVirtualrealityReclusiontemporalCybercrimesEncryptionransomwareCybersexWormsComputeraddictionRansomAdwareFlamewarsGoldenruleSlangSpamChildpornographyDomainOfflineNetworketiquetteHackingIllegalaccessFraudComputerforgeryProofreadPharmingCyberspaceLockscreenransomwareExpertiseWifieavesdroppingComputerethicsOnlineCyberVirtualworldTrojanhorsesPhishingCybercriminalsTexttalkViolationCopyrightinfringementSysteminterferenceComputerCriminalactivitiesSpywareVirtualselfMisuseofdevicesTechnologyMalwareHackersComputervirusesPiracyScreamingDatainterferenceInternetthreatsInformationCopyrightholderIllegalinterceptionCopyrightVirusesSafetyCyberdefamationViewpointsNetiquettePlagiarismDataprivacyOnlinefraudCyberbullyingIllegaldownloading

IT BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
  1. Spoofing
  2. Network
  3. Electronic theft
  4. Ransomware
  5. Privacy
  6. Virtual reality
  7. Reclusion temporal
  8. Cybercrimes
  9. Encryption ransomware
  10. Cybersex
  11. Worms
  12. Computer addiction
  13. Ransom
  14. Adware
  15. Flame wars
  16. Golden rule
  17. Slang
  18. Spam
  19. Child pornography
  20. Domain
  21. Offline
  22. Network etiquette
  23. Hacking
  24. Illegal access
  25. Fraud
  26. Computer forgery
  27. Proofread
  28. Pharming
  29. Cyberspace
  30. Lockscreen ransomware
  31. Expertise
  32. Wifi eavesdropping
  33. Computer ethics
  34. Online
  35. Cyber
  36. Virtual world
  37. Trojan horses
  38. Phishing
  39. Cybercriminals
  40. Text talk
  41. Violation
  42. Copyright infringement
  43. System interference
  44. Computer
  45. Criminal activities
  46. Spyware
  47. Virtual self
  48. Misuse of devices
  49. Technology
  50. Malware
  51. Hackers
  52. Computer viruses
  53. Piracy
  54. Screaming
  55. Data interference
  56. Internet threats
  57. Information
  58. Copyright holder
  59. Illegal interception
  60. Copyright
  61. Viruses
  62. Safety
  63. Cyber defamation
  64. Viewpoints
  65. Netiquette
  66. Plagiarism
  67. Data privacy
  68. Online fraud
  69. Cyberbullying
  70. Illegal downloading