DNSSMTPMetadataCharactersetProprietaryLossycompressionProtocolVonNeumannarchitecturePOPOpensourceCoresRouterSwitchBitCopyrightDesign andPatents Act1998PrimarystorageColourdepthIMAPRegisterSoftwarelicencesUnicodeHexadecimalMultitaskingSamplerateASCIISecondarystorageFree!StandardsWirelessaccesspointMegabyteKilobyteCachesizeByteThe DataProtectionAct 2018TCP/IPResolutionCUClockspeedEthernetLosslesscompressionEncryptionsoftwareComputerMisuseAct 1990DNSSMTPMetadataCharactersetProprietaryLossycompressionProtocolVonNeumannarchitecturePOPOpensourceCoresRouterSwitchBitCopyrightDesign andPatents Act1998PrimarystorageColourdepthIMAPRegisterSoftwarelicencesUnicodeHexadecimalMultitaskingSamplerateASCIISecondarystorageFree!StandardsWirelessaccesspointMegabyteKilobyteCachesizeByteThe DataProtectionAct 2018TCP/IPResolutionCUClockspeedEthernetLosslesscompressionEncryptionsoftwareComputerMisuseAct 1990

Paper 1 Key Terms - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
  1. DNS
  2. SMTP
  3. Metadata
  4. Character set
  5. Proprietary
  6. Lossy compression
  7. Protocol
  8. Von Neumann architecture
  9. POP
  10. Open source
  11. Cores
  12. Router
  13. Switch
  14. Bit
  15. Copyright Design and Patents Act 1998
  16. Primary storage
  17. Colour depth
  18. IMAP
  19. Register
  20. Software licences
  21. Unicode
  22. Hexadecimal
  23. Multitasking
  24. Sample rate
  25. ASCII
  26. Secondary storage
  27. Free!
  28. Standards
  29. Wireless access point
  30. Megabyte
  31. Kilobyte
  32. Cache size
  33. Byte
  34. The Data Protection Act 2018
  35. TCP/IP
  36. Resolution
  37. CU
  38. Clock speed
  39. Ethernet
  40. Lossless compression
  41. Encryption software
  42. Computer Misuse Act 1990