PeripheralsApplicationSoftwareUtilitySoftwareProgrammingSoftwareSharewaremouseCentralProcessingUnit (CPU)monitorOperatingSystem(OS)EthicsBIOS/UEFIPowerSupplyGraphicsProcessingUnit (GPU)outputNetworkAdapterOpen-SourceMotherboard(MoBo)inputx86BruteForceMachine/ComputerLanguagekeyboardColdBootDefaultPasswordSystemSoftwareAndroidFirmwareBinaryDriverSoftwareCircuit(s)processingExamples ofUnauthorizedUseCybersecurityWindowsKeyboardSnifferAcceptableUse Policy(AUP)Human/ProgrammingLanguageiOSHardDriveDevice(HDD)Linux,Windows,iOSFreewareMeltdownattackARMCompilerMacOSExamplesofAuthorizedUseShortTermstorageAMonitorDarklyClosed-SourceRandomAccessMemory(RAM)PeripheralsApplicationSoftwareUtilitySoftwareProgrammingSoftwareSharewaremouseCentralProcessingUnit (CPU)monitorOperatingSystem(OS)EthicsBIOS/UEFIPowerSupplyGraphicsProcessingUnit (GPU)outputNetworkAdapterOpen-SourceMotherboard(MoBo)inputx86BruteForceMachine/ComputerLanguagekeyboardColdBootDefaultPasswordSystemSoftwareAndroidFirmwareBinaryDriverSoftwareCircuit(s)processingExamples ofUnauthorizedUseCybersecurityWindowsKeyboardSnifferAcceptableUse Policy(AUP)Human/ProgrammingLanguageiOSHardDriveDevice(HDD)Linux,Windows,iOSFreewareMeltdownattackARMCompilerMacOSExamplesofAuthorizedUseShortTermstorageAMonitorDarklyClosed-SourceRandomAccessMemory(RAM)

1.1 Foundations of IT Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Peripherals
  2. Application Software
  3. Utility Software
  4. Programming Software
  5. Shareware
  6. mouse
  7. Central Processing Unit (CPU)
  8. monitor
  9. Operating System (OS)
  10. Ethics
  11. BIOS/UEFI
  12. Power Supply
  13. Graphics Processing Unit (GPU)
  14. output
  15. Network Adapter
  16. Open-Source
  17. Motherboard (MoBo)
  18. input
  19. x86
  20. Brute Force
  21. Machine/Computer Language
  22. keyboard
  23. Cold Boot
  24. Default Password
  25. System Software
  26. Android
  27. Firmware
  28. Binary
  29. Driver Software
  30. Circuit(s)
  31. processing
  32. Examples of Unauthorized Use
  33. Cybersecurity
  34. Windows
  35. Keyboard Sniffer
  36. Acceptable Use Policy (AUP)
  37. Human/Programming Language
  38. iOS
  39. Hard Drive Device (HDD)
  40. Linux, Windows, iOS
  41. Freeware
  42. Meltdown attack
  43. ARM
  44. Compiler
  45. MacOS
  46. Examples of Authorized Use
  47. Short Term storage
  48. A Monitor Darkly
  49. Closed-Source
  50. Random Access Memory (RAM)