ExpertiseCybercrimesCopyrightinfringementAdwareComputerforgeryWormsPharmingOnlineCyberbullyingEncryptionransomwareIllegalinterceptionOnlinefraudHackersIllegaldownloadingRansomSpamPiracyInformationMalwareTexttalkSysteminterferenceOfflineComputerHackingMisuseofdevicesCriminalactivitiesCopyrightholderWifieavesdroppingSlangCybersexGoldenruleDatainterferenceCyberdefamationNetiquetteComputerethicsDomainNetworkCybercriminalsReclusiontemporalCyberspaceDataprivacyIllegalaccessFraudSpoofingVirusesComputervirusesProofreadSpywareCyberLockscreenransomwarePhishingElectronictheftViewpointsComputeraddictionTrojanhorsesFlamewarsPrivacyPlagiarismTechnologyCopyrightSafetyNetworketiquetteScreamingInternetthreatsChildpornographyVirtualrealityViolationRansomwareVirtualworldVirtualselfExpertiseCybercrimesCopyrightinfringementAdwareComputerforgeryWormsPharmingOnlineCyberbullyingEncryptionransomwareIllegalinterceptionOnlinefraudHackersIllegaldownloadingRansomSpamPiracyInformationMalwareTexttalkSysteminterferenceOfflineComputerHackingMisuseofdevicesCriminalactivitiesCopyrightholderWifieavesdroppingSlangCybersexGoldenruleDatainterferenceCyberdefamationNetiquetteComputerethicsDomainNetworkCybercriminalsReclusiontemporalCyberspaceDataprivacyIllegalaccessFraudSpoofingVirusesComputervirusesProofreadSpywareCyberLockscreenransomwarePhishingElectronictheftViewpointsComputeraddictionTrojanhorsesFlamewarsPrivacyPlagiarismTechnologyCopyrightSafetyNetworketiquetteScreamingInternetthreatsChildpornographyVirtualrealityViolationRansomwareVirtualworldVirtualself

IT BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
  1. Expertise
  2. Cybercrimes
  3. Copyright infringement
  4. Adware
  5. Computer forgery
  6. Worms
  7. Pharming
  8. Online
  9. Cyberbullying
  10. Encryption ransomware
  11. Illegal interception
  12. Online fraud
  13. Hackers
  14. Illegal downloading
  15. Ransom
  16. Spam
  17. Piracy
  18. Information
  19. Malware
  20. Text talk
  21. System interference
  22. Offline
  23. Computer
  24. Hacking
  25. Misuse of devices
  26. Criminal activities
  27. Copyright holder
  28. Wifi eavesdropping
  29. Slang
  30. Cybersex
  31. Golden rule
  32. Data interference
  33. Cyber defamation
  34. Netiquette
  35. Computer ethics
  36. Domain
  37. Network
  38. Cybercriminals
  39. Reclusion temporal
  40. Cyberspace
  41. Data privacy
  42. Illegal access
  43. Fraud
  44. Spoofing
  45. Viruses
  46. Computer viruses
  47. Proofread
  48. Spyware
  49. Cyber
  50. Lockscreen ransomware
  51. Phishing
  52. Electronic theft
  53. Viewpoints
  54. Computer addiction
  55. Trojan horses
  56. Flame wars
  57. Privacy
  58. Plagiarism
  59. Technology
  60. Copyright
  61. Safety
  62. Network etiquette
  63. Screaming
  64. Internet threats
  65. Child pornography
  66. Virtual reality
  67. Violation
  68. Ransomware
  69. Virtual world
  70. Virtual self