ElectronictheftGoldenrulePrivacyNetiquetteIllegaldownloadingCopyrightPiracyCybercrimesRansomViewpointsCyberspaceIllegalaccessScreamingDatainterferenceCopyrightholderEncryptionransomwarePlagiarismVirusesCyberbullyingSlangFraudSysteminterferenceComputerethicsMalwareCybercriminalsComputeraddictionReclusiontemporalComputerforgeryProofreadComputervirusesCyberdefamationMisuseofdevicesVirtualworldTexttalkTechnologyVirtualrealityIllegalinterceptionExpertiseChildpornographyOfflineDataprivacySafetySpamCybersexOnlineCyberInternetthreatsFlamewarsHackingHackersAdwareSpywareOnlinefraudNetworkPharmingPhishingCriminalactivitiesNetworketiquetteTrojanhorsesWifieavesdroppingSpoofingRansomwareLockscreenransomwareInformationCopyrightinfringementVirtualselfComputerWormsDomainViolationElectronictheftGoldenrulePrivacyNetiquetteIllegaldownloadingCopyrightPiracyCybercrimesRansomViewpointsCyberspaceIllegalaccessScreamingDatainterferenceCopyrightholderEncryptionransomwarePlagiarismVirusesCyberbullyingSlangFraudSysteminterferenceComputerethicsMalwareCybercriminalsComputeraddictionReclusiontemporalComputerforgeryProofreadComputervirusesCyberdefamationMisuseofdevicesVirtualworldTexttalkTechnologyVirtualrealityIllegalinterceptionExpertiseChildpornographyOfflineDataprivacySafetySpamCybersexOnlineCyberInternetthreatsFlamewarsHackingHackersAdwareSpywareOnlinefraudNetworkPharmingPhishingCriminalactivitiesNetworketiquetteTrojanhorsesWifieavesdroppingSpoofingRansomwareLockscreenransomwareInformationCopyrightinfringementVirtualselfComputerWormsDomainViolation

IT BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
  1. Electronic theft
  2. Golden rule
  3. Privacy
  4. Netiquette
  5. Illegal downloading
  6. Copyright
  7. Piracy
  8. Cybercrimes
  9. Ransom
  10. Viewpoints
  11. Cyberspace
  12. Illegal access
  13. Screaming
  14. Data interference
  15. Copyright holder
  16. Encryption ransomware
  17. Plagiarism
  18. Viruses
  19. Cyberbullying
  20. Slang
  21. Fraud
  22. System interference
  23. Computer ethics
  24. Malware
  25. Cybercriminals
  26. Computer addiction
  27. Reclusion temporal
  28. Computer forgery
  29. Proofread
  30. Computer viruses
  31. Cyber defamation
  32. Misuse of devices
  33. Virtual world
  34. Text talk
  35. Technology
  36. Virtual reality
  37. Illegal interception
  38. Expertise
  39. Child pornography
  40. Offline
  41. Data privacy
  42. Safety
  43. Spam
  44. Cybersex
  45. Online
  46. Cyber
  47. Internet threats
  48. Flame wars
  49. Hacking
  50. Hackers
  51. Adware
  52. Spyware
  53. Online fraud
  54. Network
  55. Pharming
  56. Phishing
  57. Criminal activities
  58. Network etiquette
  59. Trojan horses
  60. Wifi eavesdropping
  61. Spoofing
  62. Ransomware
  63. Lockscreen ransomware
  64. Information
  65. Copyright infringement
  66. Virtual self
  67. Computer
  68. Worms
  69. Domain
  70. Violation