Machine/Computer Language monitor Ethics Android Firmware Circuit(s) Graphics Processing Unit (GPU) Binary Motherboard (MoBo) Open- Source Cybersecurity Compiler keyboard System Software Keyboard Sniffer Acceptable Use Policy (AUP) iOS x86 MacOS Examples of Authorized Use Programming Software BIOS/UEFI processing Closed- Source Linux, Windows, iOS A Monitor Darkly Central Processing Unit (CPU) ARM Examples of Unauthorized Use input Human/Programming Language Shareware mouse Default Password Driver Software Random Access Memory (RAM) Hard Drive Device (HDD) Peripherals output Cold Boot Brute Force Meltdown attack Windows Freeware Operating System (OS) Utility Software Network Adapter Short Term storage Power Supply Application Software Machine/Computer Language monitor Ethics Android Firmware Circuit(s) Graphics Processing Unit (GPU) Binary Motherboard (MoBo) Open- Source Cybersecurity Compiler keyboard System Software Keyboard Sniffer Acceptable Use Policy (AUP) iOS x86 MacOS Examples of Authorized Use Programming Software BIOS/UEFI processing Closed- Source Linux, Windows, iOS A Monitor Darkly Central Processing Unit (CPU) ARM Examples of Unauthorized Use input Human/Programming Language Shareware mouse Default Password Driver Software Random Access Memory (RAM) Hard Drive Device (HDD) Peripherals output Cold Boot Brute Force Meltdown attack Windows Freeware Operating System (OS) Utility Software Network Adapter Short Term storage Power Supply Application Software
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Machine/Computer Language
monitor
Ethics
Android
Firmware
Circuit(s)
Graphics Processing Unit (GPU)
Binary
Motherboard (MoBo)
Open-Source
Cybersecurity
Compiler
keyboard
System Software
Keyboard Sniffer
Acceptable Use Policy (AUP)
iOS
x86
MacOS
Examples of Authorized Use
Programming Software
BIOS/UEFI
processing
Closed-Source
Linux, Windows, iOS
A Monitor Darkly
Central Processing Unit (CPU)
ARM
Examples of Unauthorized Use
input
Human/Programming Language
Shareware
mouse
Default Password
Driver Software
Random Access Memory (RAM)
Hard Drive Device (HDD)
Peripherals
output
Cold Boot
Brute Force
Meltdown attack
Windows
Freeware
Operating System (OS)
Utility Software
Network Adapter
Short Term storage
Power Supply
Application Software