DatainterferenceViolationWifieavesdroppingOnlineSysteminterferenceEncryptionransomwareReclusiontemporalSpamNetworketiquetteComputerethicsInformationPiracyIllegalinterceptionPharmingTechnologyHackersProofreadComputervirusesCriminalactivitiesGoldenruleCybersexCyberdefamationChildpornographyVirtualselfIllegalaccessViewpointsOnlinefraudLockscreenransomwareComputerforgeryCopyrightinfringementTrojanhorsesCyberspaceDataprivacyWormsPhishingCyberbullyingCybercrimesVirtualrealityElectronictheftPlagiarismFlamewarsComputerDomainAdwareCyberInternetthreatsComputeraddictionVirusesHackingRansomOfflineExpertiseMalwareFraudCopyrightVirtualworldTexttalkCybercriminalsRansomwareNetiquetteIllegaldownloadingNetworkScreamingSpywareMisuseofdevicesSpoofingCopyrightholderPrivacySafetySlangDatainterferenceViolationWifieavesdroppingOnlineSysteminterferenceEncryptionransomwareReclusiontemporalSpamNetworketiquetteComputerethicsInformationPiracyIllegalinterceptionPharmingTechnologyHackersProofreadComputervirusesCriminalactivitiesGoldenruleCybersexCyberdefamationChildpornographyVirtualselfIllegalaccessViewpointsOnlinefraudLockscreenransomwareComputerforgeryCopyrightinfringementTrojanhorsesCyberspaceDataprivacyWormsPhishingCyberbullyingCybercrimesVirtualrealityElectronictheftPlagiarismFlamewarsComputerDomainAdwareCyberInternetthreatsComputeraddictionVirusesHackingRansomOfflineExpertiseMalwareFraudCopyrightVirtualworldTexttalkCybercriminalsRansomwareNetiquetteIllegaldownloadingNetworkScreamingSpywareMisuseofdevicesSpoofingCopyrightholderPrivacySafetySlang

IT BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
  1. Data interference
  2. Violation
  3. Wifi eavesdropping
  4. Online
  5. System interference
  6. Encryption ransomware
  7. Reclusion temporal
  8. Spam
  9. Network etiquette
  10. Computer ethics
  11. Information
  12. Piracy
  13. Illegal interception
  14. Pharming
  15. Technology
  16. Hackers
  17. Proofread
  18. Computer viruses
  19. Criminal activities
  20. Golden rule
  21. Cybersex
  22. Cyber defamation
  23. Child pornography
  24. Virtual self
  25. Illegal access
  26. Viewpoints
  27. Online fraud
  28. Lockscreen ransomware
  29. Computer forgery
  30. Copyright infringement
  31. Trojan horses
  32. Cyberspace
  33. Data privacy
  34. Worms
  35. Phishing
  36. Cyberbullying
  37. Cybercrimes
  38. Virtual reality
  39. Electronic theft
  40. Plagiarism
  41. Flame wars
  42. Computer
  43. Domain
  44. Adware
  45. Cyber
  46. Internet threats
  47. Computer addiction
  48. Viruses
  49. Hacking
  50. Ransom
  51. Offline
  52. Expertise
  53. Malware
  54. Fraud
  55. Copyright
  56. Virtual world
  57. Text talk
  58. Cybercriminals
  59. Ransomware
  60. Netiquette
  61. Illegal downloading
  62. Network
  63. Screaming
  64. Spyware
  65. Misuse of devices
  66. Spoofing
  67. Copyright holder
  68. Privacy
  69. Safety
  70. Slang