Machine/ComputerLanguagemonitorEthicsAndroidFirmwareCircuit(s)GraphicsProcessingUnit (GPU)BinaryMotherboard(MoBo)Open-SourceCybersecurityCompilerkeyboardSystemSoftwareKeyboardSnifferAcceptableUse Policy(AUP)iOSx86MacOSExamplesofAuthorizedUseProgrammingSoftwareBIOS/UEFIprocessingClosed-SourceLinux,Windows,iOSAMonitorDarklyCentralProcessingUnit (CPU)ARMExamples ofUnauthorizedUseinputHuman/ProgrammingLanguageSharewaremouseDefaultPasswordDriverSoftwareRandomAccessMemory(RAM)HardDriveDevice(HDD)PeripheralsoutputColdBootBruteForceMeltdownattackWindowsFreewareOperatingSystem(OS)UtilitySoftwareNetworkAdapterShortTermstoragePowerSupplyApplicationSoftwareMachine/ComputerLanguagemonitorEthicsAndroidFirmwareCircuit(s)GraphicsProcessingUnit (GPU)BinaryMotherboard(MoBo)Open-SourceCybersecurityCompilerkeyboardSystemSoftwareKeyboardSnifferAcceptableUse Policy(AUP)iOSx86MacOSExamplesofAuthorizedUseProgrammingSoftwareBIOS/UEFIprocessingClosed-SourceLinux,Windows,iOSAMonitorDarklyCentralProcessingUnit (CPU)ARMExamples ofUnauthorizedUseinputHuman/ProgrammingLanguageSharewaremouseDefaultPasswordDriverSoftwareRandomAccessMemory(RAM)HardDriveDevice(HDD)PeripheralsoutputColdBootBruteForceMeltdownattackWindowsFreewareOperatingSystem(OS)UtilitySoftwareNetworkAdapterShortTermstoragePowerSupplyApplicationSoftware

1.1 Foundations of IT Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Machine/Computer Language
  2. monitor
  3. Ethics
  4. Android
  5. Firmware
  6. Circuit(s)
  7. Graphics Processing Unit (GPU)
  8. Binary
  9. Motherboard (MoBo)
  10. Open-Source
  11. Cybersecurity
  12. Compiler
  13. keyboard
  14. System Software
  15. Keyboard Sniffer
  16. Acceptable Use Policy (AUP)
  17. iOS
  18. x86
  19. MacOS
  20. Examples of Authorized Use
  21. Programming Software
  22. BIOS/UEFI
  23. processing
  24. Closed-Source
  25. Linux, Windows, iOS
  26. A Monitor Darkly
  27. Central Processing Unit (CPU)
  28. ARM
  29. Examples of Unauthorized Use
  30. input
  31. Human/Programming Language
  32. Shareware
  33. mouse
  34. Default Password
  35. Driver Software
  36. Random Access Memory (RAM)
  37. Hard Drive Device (HDD)
  38. Peripherals
  39. output
  40. Cold Boot
  41. Brute Force
  42. Meltdown attack
  43. Windows
  44. Freeware
  45. Operating System (OS)
  46. Utility Software
  47. Network Adapter
  48. Short Term storage
  49. Power Supply
  50. Application Software