monitorSystemSoftwareHuman/ProgrammingLanguageAcceptableUse Policy(AUP)HardDriveDevice(HDD)CentralProcessingUnit (CPU)GraphicsProcessingUnit (GPU)Linux,Windows,iOSExamplesofAuthorizedUseFirmwareWindowsMotherboard(MoBo)SharewareUtilitySoftwareMachine/ComputerLanguageiOSkeyboardBinaryBIOS/UEFIAndroidCompilermouseClosed-SourceColdBootShortTermstorageCircuit(s)ProgrammingSoftwareNetworkAdapterExamples ofUnauthorizedUseRandomAccessMemory(RAM)DefaultPasswordOperatingSystem(OS)AMonitorDarklyARMinputMacOSprocessingMeltdownattackCybersecurityEthicsFreewareKeyboardSnifferBruteForcePowerSupplyoutputx86Open-SourceApplicationSoftwarePeripheralsDriverSoftwaremonitorSystemSoftwareHuman/ProgrammingLanguageAcceptableUse Policy(AUP)HardDriveDevice(HDD)CentralProcessingUnit (CPU)GraphicsProcessingUnit (GPU)Linux,Windows,iOSExamplesofAuthorizedUseFirmwareWindowsMotherboard(MoBo)SharewareUtilitySoftwareMachine/ComputerLanguageiOSkeyboardBinaryBIOS/UEFIAndroidCompilermouseClosed-SourceColdBootShortTermstorageCircuit(s)ProgrammingSoftwareNetworkAdapterExamples ofUnauthorizedUseRandomAccessMemory(RAM)DefaultPasswordOperatingSystem(OS)AMonitorDarklyARMinputMacOSprocessingMeltdownattackCybersecurityEthicsFreewareKeyboardSnifferBruteForcePowerSupplyoutputx86Open-SourceApplicationSoftwarePeripheralsDriverSoftware

1.1 Foundations of IT Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. monitor
  2. System Software
  3. Human/Programming Language
  4. Acceptable Use Policy (AUP)
  5. Hard Drive Device (HDD)
  6. Central Processing Unit (CPU)
  7. Graphics Processing Unit (GPU)
  8. Linux, Windows, iOS
  9. Examples of Authorized Use
  10. Firmware
  11. Windows
  12. Motherboard (MoBo)
  13. Shareware
  14. Utility Software
  15. Machine/Computer Language
  16. iOS
  17. keyboard
  18. Binary
  19. BIOS/UEFI
  20. Android
  21. Compiler
  22. mouse
  23. Closed-Source
  24. Cold Boot
  25. Short Term storage
  26. Circuit(s)
  27. Programming Software
  28. Network Adapter
  29. Examples of Unauthorized Use
  30. Random Access Memory (RAM)
  31. Default Password
  32. Operating System (OS)
  33. A Monitor Darkly
  34. ARM
  35. input
  36. MacOS
  37. processing
  38. Meltdown attack
  39. Cybersecurity
  40. Ethics
  41. Freeware
  42. Keyboard Sniffer
  43. Brute Force
  44. Power Supply
  45. output
  46. x86
  47. Open-Source
  48. Application Software
  49. Peripherals
  50. Driver Software