NetworkComputerforgeryElectronictheftAdwareScreamingInformationMisuseofdevicesIllegalinterceptionCyberdefamationComputervirusesIllegaldownloadingTexttalkVirtualrealityCybercriminalsTrojanhorsesSpamIllegalaccessCyberspaceCriminalactivitiesPiracyComputerethicsCopyrightinfringementReclusiontemporalCopyrightCybercrimesVirtualworldCyberbullyingVirusesProofreadSlangHackingOfflineCyberDomainChildpornographyDatainterferencePhishingHackersExpertiseEncryptionransomwareSysteminterferenceOnlinefraudRansomNetiquetteComputerSafetySpywareVirtualselfWifieavesdroppingSpoofingWormsMalwarePlagiarismOnlineComputeraddictionLockscreenransomwareDataprivacyFlamewarsPharmingViolationTechnologyViewpointsRansomwareCopyrightholderFraudNetworketiquettePrivacyGoldenruleCybersexInternetthreatsNetworkComputerforgeryElectronictheftAdwareScreamingInformationMisuseofdevicesIllegalinterceptionCyberdefamationComputervirusesIllegaldownloadingTexttalkVirtualrealityCybercriminalsTrojanhorsesSpamIllegalaccessCyberspaceCriminalactivitiesPiracyComputerethicsCopyrightinfringementReclusiontemporalCopyrightCybercrimesVirtualworldCyberbullyingVirusesProofreadSlangHackingOfflineCyberDomainChildpornographyDatainterferencePhishingHackersExpertiseEncryptionransomwareSysteminterferenceOnlinefraudRansomNetiquetteComputerSafetySpywareVirtualselfWifieavesdroppingSpoofingWormsMalwarePlagiarismOnlineComputeraddictionLockscreenransomwareDataprivacyFlamewarsPharmingViolationTechnologyViewpointsRansomwareCopyrightholderFraudNetworketiquettePrivacyGoldenruleCybersexInternetthreats

IT BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
  1. Network
  2. Computer forgery
  3. Electronic theft
  4. Adware
  5. Screaming
  6. Information
  7. Misuse of devices
  8. Illegal interception
  9. Cyber defamation
  10. Computer viruses
  11. Illegal downloading
  12. Text talk
  13. Virtual reality
  14. Cybercriminals
  15. Trojan horses
  16. Spam
  17. Illegal access
  18. Cyberspace
  19. Criminal activities
  20. Piracy
  21. Computer ethics
  22. Copyright infringement
  23. Reclusion temporal
  24. Copyright
  25. Cybercrimes
  26. Virtual world
  27. Cyberbullying
  28. Viruses
  29. Proofread
  30. Slang
  31. Hacking
  32. Offline
  33. Cyber
  34. Domain
  35. Child pornography
  36. Data interference
  37. Phishing
  38. Hackers
  39. Expertise
  40. Encryption ransomware
  41. System interference
  42. Online fraud
  43. Ransom
  44. Netiquette
  45. Computer
  46. Safety
  47. Spyware
  48. Virtual self
  49. Wifi eavesdropping
  50. Spoofing
  51. Worms
  52. Malware
  53. Plagiarism
  54. Online
  55. Computer addiction
  56. Lockscreen ransomware
  57. Data privacy
  58. Flame wars
  59. Pharming
  60. Violation
  61. Technology
  62. Viewpoints
  63. Ransomware
  64. Copyright holder
  65. Fraud
  66. Network etiquette
  67. Privacy
  68. Golden rule
  69. Cybersex
  70. Internet threats