Lossless compression Computer Misuse Act 1990 CU Standards Cache size Megabyte Ethernet Clock speed ASCII Router IMAP Hexadecimal Unicode Lossy compression Kilobyte Switch Sample rate Open source Copyright Design and Patents Act 1998 Wireless access point Proprietary Byte DNS SMTP Multitasking Metadata TCP/IP Resolution POP Bit Character set Software licences The Data Protection Act 2018 Secondary storage Primary storage Register Von Neumann architecture Protocol Cores Colour depth Encryption software Free! Lossless compression Computer Misuse Act 1990 CU Standards Cache size Megabyte Ethernet Clock speed ASCII Router IMAP Hexadecimal Unicode Lossy compression Kilobyte Switch Sample rate Open source Copyright Design and Patents Act 1998 Wireless access point Proprietary Byte DNS SMTP Multitasking Metadata TCP/IP Resolution POP Bit Character set Software licences The Data Protection Act 2018 Secondary storage Primary storage Register Von Neumann architecture Protocol Cores Colour depth Encryption software Free!
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Lossless compression
Computer Misuse Act 1990
CU
Standards
Cache size
Megabyte
Ethernet
Clock speed
ASCII
Router
IMAP
Hexadecimal
Unicode
Lossy compression
Kilobyte
Switch
Sample rate
Open source
Copyright Design and Patents Act 1998
Wireless access point
Proprietary
Byte
DNS
SMTP
Multitasking
Metadata
TCP/IP
Resolution
POP
Bit
Character set
Software licences
The Data Protection Act 2018
Secondary storage
Primary storage
Register
Von Neumann architecture
Protocol
Cores
Colour depth
Encryption software
Free!