Cache size Driver Memory management Privacy issues Multitasking Metadata Lossless compression Sample bit depth Data compression software Peripheral management Utility software Character set User interface Encryption software Proprietary User management Cores Protocol Open source Free! File management Operating system Software licences Sample duration Colour depth Resolution Sample rate Copyright Design and Patents Act 1998 Lossy compression Computer Misuse Act 1990 Secondary storage Defragmentation software Primary storage The Data Protection Act 2018 Cache size Driver Memory management Privacy issues Multitasking Metadata Lossless compression Sample bit depth Data compression software Peripheral management Utility software Character set User interface Encryption software Proprietary User management Cores Protocol Open source Free! File management Operating system Software licences Sample duration Colour depth Resolution Sample rate Copyright Design and Patents Act 1998 Lossy compression Computer Misuse Act 1990 Secondary storage Defragmentation software Primary storage The Data Protection Act 2018
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cache size
Driver
Memory management
Privacy issues
Multitasking
Metadata
Lossless compression
Sample bit depth
Data compression software
Peripheral management
Utility software
Character set
User interface
Encryption software
Proprietary
User management
Cores
Protocol
Open source
Free!
File management
Operating system
Software licences
Sample duration
Colour depth
Resolution
Sample rate
Copyright Design and Patents Act 1998
Lossy compression
Computer Misuse Act 1990
Secondary storage
Defragmentation software
Primary storage
The Data Protection Act 2018