Secondary storage Sample duration Peripheral management Proprietary Software licences The Data Protection Act 2018 Operating system Data compression software Computer Misuse Act 1990 Sample rate Lossy compression Protocol Encryption software Resolution User management Memory management User interface Privacy issues Lossless compression Utility software Multitasking Colour depth Cache size Primary storage Defragmentation software Driver Cores Character set Open source File management Free! Copyright Design and Patents Act 1998 Metadata Sample bit depth Secondary storage Sample duration Peripheral management Proprietary Software licences The Data Protection Act 2018 Operating system Data compression software Computer Misuse Act 1990 Sample rate Lossy compression Protocol Encryption software Resolution User management Memory management User interface Privacy issues Lossless compression Utility software Multitasking Colour depth Cache size Primary storage Defragmentation software Driver Cores Character set Open source File management Free! Copyright Design and Patents Act 1998 Metadata Sample bit depth
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Secondary storage
Sample duration
Peripheral management
Proprietary
Software licences
The Data Protection Act 2018
Operating system
Data compression software
Computer Misuse Act 1990
Sample rate
Lossy compression
Protocol
Encryption software
Resolution
User management
Memory management
User interface
Privacy issues
Lossless compression
Utility software
Multitasking
Colour depth
Cache size
Primary storage
Defragmentation software
Driver
Cores
Character set
Open source
File management
Free!
Copyright Design and Patents Act 1998
Metadata
Sample bit depth