OperatingsystemEncryptionsoftwareMultitaskingOpensourcePrimarystorageSampledurationDatacompressionsoftwareCharactersetCopyrightDesign andPatents Act1998PrivacyissuesUtilitysoftwareMetadataSamplerateCachesizeSamplebitdepthDefragmentationsoftwareProtocolFree!PeripheralmanagementUserinterfaceLosslesscompressionUsermanagementColourdepthSecondarystorageFilemanagementResolutionSoftwarelicencesDriverMemorymanagementProprietaryComputerMisuseAct 1990CoresLossycompressionThe DataProtectionAct 2018OperatingsystemEncryptionsoftwareMultitaskingOpensourcePrimarystorageSampledurationDatacompressionsoftwareCharactersetCopyrightDesign andPatents Act1998PrivacyissuesUtilitysoftwareMetadataSamplerateCachesizeSamplebitdepthDefragmentationsoftwareProtocolFree!PeripheralmanagementUserinterfaceLosslesscompressionUsermanagementColourdepthSecondarystorageFilemanagementResolutionSoftwarelicencesDriverMemorymanagementProprietaryComputerMisuseAct 1990CoresLossycompressionThe DataProtectionAct 2018

Paper 1 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
  1. Operating system
  2. Encryption software
  3. Multitasking
  4. Open source
  5. Primary storage
  6. Sample duration
  7. Data compression software
  8. Character set
  9. Copyright Design and Patents Act 1998
  10. Privacy issues
  11. Utility software
  12. Metadata
  13. Sample rate
  14. Cache size
  15. Sample bit depth
  16. Defragmentation software
  17. Protocol
  18. Free!
  19. Peripheral management
  20. User interface
  21. Lossless compression
  22. User management
  23. Colour depth
  24. Secondary storage
  25. File management
  26. Resolution
  27. Software licences
  28. Driver
  29. Memory management
  30. Proprietary
  31. Computer Misuse Act 1990
  32. Cores
  33. Lossy compression
  34. The Data Protection Act 2018