CybersexCriminalactivitiesViewpointsPhishingCopyrightholderCopyrightLockscreenransomwareChildpornographyNetworketiquetteReclusiontemporalVirusesCyberdefamationDomainSlangTexttalkPiracyPrivacyComputerforgeryRansomwareSysteminterferenceDataprivacyEncryptionransomwarePharmingMisuseofdevicesScreamingSpoofingIllegaldownloadingNetiquetteViolationOnlineHackingComputerethicsElectronictheftSpamOfflineGoldenrulePlagiarismIllegalinterceptionWifieavesdroppingCyberspaceNetworkInformationOnlinefraudCopyrightinfringementFlamewarsDatainterferenceCyberIllegalaccessCyberbullyingMalwareFraudTrojanhorsesInternetthreatsRansomSpywareAdwareComputervirusesExpertiseVirtualrealityVirtualworldVirtualselfWormsComputeraddictionCybercrimesComputerTechnologyProofreadSafetyHackersCybercriminalsCybersexCriminalactivitiesViewpointsPhishingCopyrightholderCopyrightLockscreenransomwareChildpornographyNetworketiquetteReclusiontemporalVirusesCyberdefamationDomainSlangTexttalkPiracyPrivacyComputerforgeryRansomwareSysteminterferenceDataprivacyEncryptionransomwarePharmingMisuseofdevicesScreamingSpoofingIllegaldownloadingNetiquetteViolationOnlineHackingComputerethicsElectronictheftSpamOfflineGoldenrulePlagiarismIllegalinterceptionWifieavesdroppingCyberspaceNetworkInformationOnlinefraudCopyrightinfringementFlamewarsDatainterferenceCyberIllegalaccessCyberbullyingMalwareFraudTrojanhorsesInternetthreatsRansomSpywareAdwareComputervirusesExpertiseVirtualrealityVirtualworldVirtualselfWormsComputeraddictionCybercrimesComputerTechnologyProofreadSafetyHackersCybercriminals

IT BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
  1. Cybersex
  2. Criminal activities
  3. Viewpoints
  4. Phishing
  5. Copyright holder
  6. Copyright
  7. Lockscreen ransomware
  8. Child pornography
  9. Network etiquette
  10. Reclusion temporal
  11. Viruses
  12. Cyber defamation
  13. Domain
  14. Slang
  15. Text talk
  16. Piracy
  17. Privacy
  18. Computer forgery
  19. Ransomware
  20. System interference
  21. Data privacy
  22. Encryption ransomware
  23. Pharming
  24. Misuse of devices
  25. Screaming
  26. Spoofing
  27. Illegal downloading
  28. Netiquette
  29. Violation
  30. Online
  31. Hacking
  32. Computer ethics
  33. Electronic theft
  34. Spam
  35. Offline
  36. Golden rule
  37. Plagiarism
  38. Illegal interception
  39. Wifi eavesdropping
  40. Cyberspace
  41. Network
  42. Information
  43. Online fraud
  44. Copyright infringement
  45. Flame wars
  46. Data interference
  47. Cyber
  48. Illegal access
  49. Cyberbullying
  50. Malware
  51. Fraud
  52. Trojan horses
  53. Internet threats
  54. Ransom
  55. Spyware
  56. Adware
  57. Computer viruses
  58. Expertise
  59. Virtual reality
  60. Virtual world
  61. Virtual self
  62. Worms
  63. Computer addiction
  64. Cybercrimes
  65. Computer
  66. Technology
  67. Proofread
  68. Safety
  69. Hackers
  70. Cybercriminals