Operating system Encryption software Multitasking Open source Primary storage Sample duration Data compression software Character set Copyright Design and Patents Act 1998 Privacy issues Utility software Metadata Sample rate Cache size Sample bit depth Defragmentation software Protocol Free! Peripheral management User interface Lossless compression User management Colour depth Secondary storage File management Resolution Software licences Driver Memory management Proprietary Computer Misuse Act 1990 Cores Lossy compression The Data Protection Act 2018 Operating system Encryption software Multitasking Open source Primary storage Sample duration Data compression software Character set Copyright Design and Patents Act 1998 Privacy issues Utility software Metadata Sample rate Cache size Sample bit depth Defragmentation software Protocol Free! Peripheral management User interface Lossless compression User management Colour depth Secondary storage File management Resolution Software licences Driver Memory management Proprietary Computer Misuse Act 1990 Cores Lossy compression The Data Protection Act 2018
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Operating system
Encryption software
Multitasking
Open source
Primary storage
Sample duration
Data compression software
Character set
Copyright Design and Patents Act 1998
Privacy issues
Utility software
Metadata
Sample rate
Cache size
Sample bit depth
Defragmentation software
Protocol
Free!
Peripheral management
User interface
Lossless compression
User management
Colour depth
Secondary storage
File management
Resolution
Software licences
Driver
Memory management
Proprietary
Computer Misuse Act 1990
Cores
Lossy compression
The Data Protection Act 2018