monitorUtilitySoftwareEthicsSharewareMeltdownattackMacOSBruteForceAcceptableUse Policy(AUP)Open-SourceProgrammingSoftwareMotherboard(MoBo)Linux,Windows,iOSFirmwareKeyboardSnifferPeripheralsOperatingSystem(OS)WindowsCybersecuritymouseiOSCircuit(s)ARMkeyboardHuman/ProgrammingLanguageBIOS/UEFIGraphicsProcessingUnit (GPU)Closed-SourceinputShortTermstorageprocessingx86ApplicationSoftwareExamplesofAuthorizedUseNetworkAdapterAMonitorDarklyAndroidMachine/ComputerLanguagePowerSupplySystemSoftwareBinaryExamples ofUnauthorizedUseColdBootDriverSoftwareFreewareRandomAccessMemory(RAM)CompilerDefaultPasswordoutputHardDriveDevice(HDD)CentralProcessingUnit (CPU)monitorUtilitySoftwareEthicsSharewareMeltdownattackMacOSBruteForceAcceptableUse Policy(AUP)Open-SourceProgrammingSoftwareMotherboard(MoBo)Linux,Windows,iOSFirmwareKeyboardSnifferPeripheralsOperatingSystem(OS)WindowsCybersecuritymouseiOSCircuit(s)ARMkeyboardHuman/ProgrammingLanguageBIOS/UEFIGraphicsProcessingUnit (GPU)Closed-SourceinputShortTermstorageprocessingx86ApplicationSoftwareExamplesofAuthorizedUseNetworkAdapterAMonitorDarklyAndroidMachine/ComputerLanguagePowerSupplySystemSoftwareBinaryExamples ofUnauthorizedUseColdBootDriverSoftwareFreewareRandomAccessMemory(RAM)CompilerDefaultPasswordoutputHardDriveDevice(HDD)CentralProcessingUnit (CPU)

1.1 Foundations of IT Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. monitor
  2. Utility Software
  3. Ethics
  4. Shareware
  5. Meltdown attack
  6. MacOS
  7. Brute Force
  8. Acceptable Use Policy (AUP)
  9. Open-Source
  10. Programming Software
  11. Motherboard (MoBo)
  12. Linux, Windows, iOS
  13. Firmware
  14. Keyboard Sniffer
  15. Peripherals
  16. Operating System (OS)
  17. Windows
  18. Cybersecurity
  19. mouse
  20. iOS
  21. Circuit(s)
  22. ARM
  23. keyboard
  24. Human/Programming Language
  25. BIOS/UEFI
  26. Graphics Processing Unit (GPU)
  27. Closed-Source
  28. input
  29. Short Term storage
  30. processing
  31. x86
  32. Application Software
  33. Examples of Authorized Use
  34. Network Adapter
  35. A Monitor Darkly
  36. Android
  37. Machine/Computer Language
  38. Power Supply
  39. System Software
  40. Binary
  41. Examples of Unauthorized Use
  42. Cold Boot
  43. Driver Software
  44. Freeware
  45. Random Access Memory (RAM)
  46. Compiler
  47. Default Password
  48. output
  49. Hard Drive Device (HDD)
  50. Central Processing Unit (CPU)