Peripherals Application Software Utility Software Programming Software Shareware mouse Central Processing Unit (CPU) monitor Operating System (OS) Ethics BIOS/UEFI Power Supply Graphics Processing Unit (GPU) output Network Adapter Open- Source Motherboard (MoBo) input x86 Brute Force Machine/Computer Language keyboard Cold Boot Default Password System Software Android Firmware Binary Driver Software Circuit(s) processing Examples of Unauthorized Use Cybersecurity Windows Keyboard Sniffer Acceptable Use Policy (AUP) Human/Programming Language iOS Hard Drive Device (HDD) Linux, Windows, iOS Freeware Meltdown attack ARM Compiler MacOS Examples of Authorized Use Short Term storage A Monitor Darkly Closed- Source Random Access Memory (RAM) Peripherals Application Software Utility Software Programming Software Shareware mouse Central Processing Unit (CPU) monitor Operating System (OS) Ethics BIOS/UEFI Power Supply Graphics Processing Unit (GPU) output Network Adapter Open- Source Motherboard (MoBo) input x86 Brute Force Machine/Computer Language keyboard Cold Boot Default Password System Software Android Firmware Binary Driver Software Circuit(s) processing Examples of Unauthorized Use Cybersecurity Windows Keyboard Sniffer Acceptable Use Policy (AUP) Human/Programming Language iOS Hard Drive Device (HDD) Linux, Windows, iOS Freeware Meltdown attack ARM Compiler MacOS Examples of Authorized Use Short Term storage A Monitor Darkly Closed- Source Random Access Memory (RAM)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Peripherals
Application Software
Utility Software
Programming Software
Shareware
mouse
Central Processing Unit (CPU)
monitor
Operating System (OS)
Ethics
BIOS/UEFI
Power Supply
Graphics Processing Unit (GPU)
output
Network Adapter
Open-Source
Motherboard (MoBo)
input
x86
Brute Force
Machine/Computer Language
keyboard
Cold Boot
Default Password
System Software
Android
Firmware
Binary
Driver Software
Circuit(s)
processing
Examples of Unauthorized Use
Cybersecurity
Windows
Keyboard Sniffer
Acceptable Use Policy (AUP)
Human/Programming Language
iOS
Hard Drive Device (HDD)
Linux, Windows, iOS
Freeware
Meltdown attack
ARM
Compiler
MacOS
Examples of Authorized Use
Short Term storage
A Monitor Darkly
Closed-Source
Random Access Memory (RAM)