TechnologyVirtualselfVirtualrealityCybercrimesIllegaldownloadingChildpornographyDataprivacyWormsCriminalactivitiesPiracyEncryptionransomwareHackingFraudTexttalkDomainInformationReclusiontemporalCopyrightinfringementRansomComputerforgeryPharmingViewpointsProofreadNetworkNetworketiquetteCopyrightholderCyberdefamationSafetySpamInternetthreatsPhishingExpertiseOnlinefraudCopyrightIllegalinterceptionDatainterferenceSpoofingNetiquetteWifieavesdroppingVirtualworldAdwareMisuseofdevicesCyberspaceOnlineComputerSlangTrojanhorsesScreamingElectronictheftLockscreenransomwareCybercriminalsHackersViolationFlamewarsCyberComputeraddictionComputervirusesSpywarePrivacyGoldenruleIllegalaccessComputerethicsVirusesOfflineRansomwareSysteminterferenceCyberbullyingMalwarePlagiarismCybersexTechnologyVirtualselfVirtualrealityCybercrimesIllegaldownloadingChildpornographyDataprivacyWormsCriminalactivitiesPiracyEncryptionransomwareHackingFraudTexttalkDomainInformationReclusiontemporalCopyrightinfringementRansomComputerforgeryPharmingViewpointsProofreadNetworkNetworketiquetteCopyrightholderCyberdefamationSafetySpamInternetthreatsPhishingExpertiseOnlinefraudCopyrightIllegalinterceptionDatainterferenceSpoofingNetiquetteWifieavesdroppingVirtualworldAdwareMisuseofdevicesCyberspaceOnlineComputerSlangTrojanhorsesScreamingElectronictheftLockscreenransomwareCybercriminalsHackersViolationFlamewarsCyberComputeraddictionComputervirusesSpywarePrivacyGoldenruleIllegalaccessComputerethicsVirusesOfflineRansomwareSysteminterferenceCyberbullyingMalwarePlagiarismCybersex

IT BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
  1. Technology
  2. Virtual self
  3. Virtual reality
  4. Cybercrimes
  5. Illegal downloading
  6. Child pornography
  7. Data privacy
  8. Worms
  9. Criminal activities
  10. Piracy
  11. Encryption ransomware
  12. Hacking
  13. Fraud
  14. Text talk
  15. Domain
  16. Information
  17. Reclusion temporal
  18. Copyright infringement
  19. Ransom
  20. Computer forgery
  21. Pharming
  22. Viewpoints
  23. Proofread
  24. Network
  25. Network etiquette
  26. Copyright holder
  27. Cyber defamation
  28. Safety
  29. Spam
  30. Internet threats
  31. Phishing
  32. Expertise
  33. Online fraud
  34. Copyright
  35. Illegal interception
  36. Data interference
  37. Spoofing
  38. Netiquette
  39. Wifi eavesdropping
  40. Virtual world
  41. Adware
  42. Misuse of devices
  43. Cyberspace
  44. Online
  45. Computer
  46. Slang
  47. Trojan horses
  48. Screaming
  49. Electronic theft
  50. Lockscreen ransomware
  51. Cybercriminals
  52. Hackers
  53. Violation
  54. Flame wars
  55. Cyber
  56. Computer addiction
  57. Computer viruses
  58. Spyware
  59. Privacy
  60. Golden rule
  61. Illegal access
  62. Computer ethics
  63. Viruses
  64. Offline
  65. Ransomware
  66. System interference
  67. Cyberbullying
  68. Malware
  69. Plagiarism
  70. Cybersex