Closed-SourceHardDriveDevice(HDD)BIOS/UEFIExamplesofAuthorizedUseExamples ofUnauthorizedUseNetworkAdapterBruteForceSharewareProgrammingSoftwareoutputApplicationSoftwareBinaryEthicsRandomAccessMemory(RAM)GraphicsProcessingUnit (GPU)Linux,Windows,iOSCentralProcessingUnit (CPU)Open-SourceCompilerWindowsOperatingSystem(OS)Human/ProgrammingLanguageDriverSoftwareiOSPeripheralsMeltdownattackUtilitySoftwareinputMachine/ComputerLanguageShortTermstorageAcceptableUse Policy(AUP)PowerSupplyARMkeyboardmonitorMacOSKeyboardSnifferCybersecurityAMonitorDarklyprocessingFreewaremouseSystemSoftwareDefaultPasswordAndroidMotherboard(MoBo)ColdBootx86FirmwareCircuit(s)Closed-SourceHardDriveDevice(HDD)BIOS/UEFIExamplesofAuthorizedUseExamples ofUnauthorizedUseNetworkAdapterBruteForceSharewareProgrammingSoftwareoutputApplicationSoftwareBinaryEthicsRandomAccessMemory(RAM)GraphicsProcessingUnit (GPU)Linux,Windows,iOSCentralProcessingUnit (CPU)Open-SourceCompilerWindowsOperatingSystem(OS)Human/ProgrammingLanguageDriverSoftwareiOSPeripheralsMeltdownattackUtilitySoftwareinputMachine/ComputerLanguageShortTermstorageAcceptableUse Policy(AUP)PowerSupplyARMkeyboardmonitorMacOSKeyboardSnifferCybersecurityAMonitorDarklyprocessingFreewaremouseSystemSoftwareDefaultPasswordAndroidMotherboard(MoBo)ColdBootx86FirmwareCircuit(s)

1.1 Foundations of IT Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Closed-Source
  2. Hard Drive Device (HDD)
  3. BIOS/UEFI
  4. Examples of Authorized Use
  5. Examples of Unauthorized Use
  6. Network Adapter
  7. Brute Force
  8. Shareware
  9. Programming Software
  10. output
  11. Application Software
  12. Binary
  13. Ethics
  14. Random Access Memory (RAM)
  15. Graphics Processing Unit (GPU)
  16. Linux, Windows, iOS
  17. Central Processing Unit (CPU)
  18. Open-Source
  19. Compiler
  20. Windows
  21. Operating System (OS)
  22. Human/Programming Language
  23. Driver Software
  24. iOS
  25. Peripherals
  26. Meltdown attack
  27. Utility Software
  28. input
  29. Machine/Computer Language
  30. Short Term storage
  31. Acceptable Use Policy (AUP)
  32. Power Supply
  33. ARM
  34. keyboard
  35. monitor
  36. MacOS
  37. Keyboard Sniffer
  38. Cybersecurity
  39. A Monitor Darkly
  40. processing
  41. Freeware
  42. mouse
  43. System Software
  44. Default Password
  45. Android
  46. Motherboard (MoBo)
  47. Cold Boot
  48. x86
  49. Firmware
  50. Circuit(s)