Memory management Metadata Sample duration Multitasking Proprietary Peripheral management Secondary storage Utility software Sample rate Privacy issues File management Free! Protocol Encryption software Data compression software The Data Protection Act 2018 Cache size Colour depth Copyright Design and Patents Act 1998 Lossy compression User interface Resolution Primary storage User management Driver Defragmentation software Character set Open source Cores Operating system Computer Misuse Act 1990 Software licences Lossless compression Sample bit depth Memory management Metadata Sample duration Multitasking Proprietary Peripheral management Secondary storage Utility software Sample rate Privacy issues File management Free! Protocol Encryption software Data compression software The Data Protection Act 2018 Cache size Colour depth Copyright Design and Patents Act 1998 Lossy compression User interface Resolution Primary storage User management Driver Defragmentation software Character set Open source Cores Operating system Computer Misuse Act 1990 Software licences Lossless compression Sample bit depth
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Memory management
Metadata
Sample duration
Multitasking
Proprietary
Peripheral management
Secondary storage
Utility software
Sample rate
Privacy issues
File management
Free!
Protocol
Encryption software
Data compression software
The Data Protection Act 2018
Cache size
Colour depth
Copyright Design and Patents Act 1998
Lossy compression
User interface
Resolution
Primary storage
User management
Driver
Defragmentation software
Character set
Open source
Cores
Operating system
Computer Misuse Act 1990
Software licences
Lossless compression
Sample bit depth