HardDriveDevice(HDD)ColdBootMachine/ComputerLanguageMacOSBinaryRandomAccessMemory(RAM)Motherboard(MoBo)Circuit(s)WindowsExamplesofAuthorizedUsex86ApplicationSoftwareHuman/ProgrammingLanguageFreewareAMonitorDarklyprocessingCentralProcessingUnit (CPU)ShortTermstoragePowerSupplyLinux,Windows,iOSGraphicsProcessingUnit (GPU)MeltdownattackDriverSoftwareAcceptableUse Policy(AUP)AndroidSharewarePeripheralsUtilitySoftwareDefaultPasswordCompilerKeyboardSnifferFirmwareOpen-SourceoutputNetworkAdapterClosed-SourceinputProgrammingSoftwareARMOperatingSystem(OS)keyboardBruteForceiOSCybersecuritymouseSystemSoftwareExamples ofUnauthorizedUseEthicsBIOS/UEFImonitorHardDriveDevice(HDD)ColdBootMachine/ComputerLanguageMacOSBinaryRandomAccessMemory(RAM)Motherboard(MoBo)Circuit(s)WindowsExamplesofAuthorizedUsex86ApplicationSoftwareHuman/ProgrammingLanguageFreewareAMonitorDarklyprocessingCentralProcessingUnit (CPU)ShortTermstoragePowerSupplyLinux,Windows,iOSGraphicsProcessingUnit (GPU)MeltdownattackDriverSoftwareAcceptableUse Policy(AUP)AndroidSharewarePeripheralsUtilitySoftwareDefaultPasswordCompilerKeyboardSnifferFirmwareOpen-SourceoutputNetworkAdapterClosed-SourceinputProgrammingSoftwareARMOperatingSystem(OS)keyboardBruteForceiOSCybersecuritymouseSystemSoftwareExamples ofUnauthorizedUseEthicsBIOS/UEFImonitor

1.1 Foundations of IT Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Hard Drive Device (HDD)
  2. Cold Boot
  3. Machine/Computer Language
  4. MacOS
  5. Binary
  6. Random Access Memory (RAM)
  7. Motherboard (MoBo)
  8. Circuit(s)
  9. Windows
  10. Examples of Authorized Use
  11. x86
  12. Application Software
  13. Human/Programming Language
  14. Freeware
  15. A Monitor Darkly
  16. processing
  17. Central Processing Unit (CPU)
  18. Short Term storage
  19. Power Supply
  20. Linux, Windows, iOS
  21. Graphics Processing Unit (GPU)
  22. Meltdown attack
  23. Driver Software
  24. Acceptable Use Policy (AUP)
  25. Android
  26. Shareware
  27. Peripherals
  28. Utility Software
  29. Default Password
  30. Compiler
  31. Keyboard Sniffer
  32. Firmware
  33. Open-Source
  34. output
  35. Network Adapter
  36. Closed-Source
  37. input
  38. Programming Software
  39. ARM
  40. Operating System (OS)
  41. keyboard
  42. Brute Force
  43. iOS
  44. Cybersecurity
  45. mouse
  46. System Software
  47. Examples of Unauthorized Use
  48. Ethics
  49. BIOS/UEFI
  50. monitor