FreewareShortTermstorageCybersecurityColdBootMeltdownattackkeyboardAcceptableUse Policy(AUP)Open-SourceDriverSoftwareWindowsPowerSupplyprocessingAndroidRandomAccessMemory(RAM)BruteForceMotherboard(MoBo)Human/ProgrammingLanguageFirmwareCompilerProgrammingSoftwareCircuit(s)PeripheralsEthicsDefaultPasswordMacOSBIOS/UEFINetworkAdapteriOSBinaryKeyboardSnifferinputLinux,Windows,iOSARMClosed-SourceOperatingSystem(OS)SystemSoftwareHardDriveDevice(HDD)CentralProcessingUnit (CPU)Examples ofUnauthorizedUseApplicationSoftwareGraphicsProcessingUnit (GPU)Machine/ComputerLanguageAMonitorDarklyUtilitySoftwareoutputmonitorExamplesofAuthorizedUsex86SharewaremouseFreewareShortTermstorageCybersecurityColdBootMeltdownattackkeyboardAcceptableUse Policy(AUP)Open-SourceDriverSoftwareWindowsPowerSupplyprocessingAndroidRandomAccessMemory(RAM)BruteForceMotherboard(MoBo)Human/ProgrammingLanguageFirmwareCompilerProgrammingSoftwareCircuit(s)PeripheralsEthicsDefaultPasswordMacOSBIOS/UEFINetworkAdapteriOSBinaryKeyboardSnifferinputLinux,Windows,iOSARMClosed-SourceOperatingSystem(OS)SystemSoftwareHardDriveDevice(HDD)CentralProcessingUnit (CPU)Examples ofUnauthorizedUseApplicationSoftwareGraphicsProcessingUnit (GPU)Machine/ComputerLanguageAMonitorDarklyUtilitySoftwareoutputmonitorExamplesofAuthorizedUsex86Sharewaremouse

1.1 Foundations of IT Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Freeware
  2. Short Term storage
  3. Cybersecurity
  4. Cold Boot
  5. Meltdown attack
  6. keyboard
  7. Acceptable Use Policy (AUP)
  8. Open-Source
  9. Driver Software
  10. Windows
  11. Power Supply
  12. processing
  13. Android
  14. Random Access Memory (RAM)
  15. Brute Force
  16. Motherboard (MoBo)
  17. Human/Programming Language
  18. Firmware
  19. Compiler
  20. Programming Software
  21. Circuit(s)
  22. Peripherals
  23. Ethics
  24. Default Password
  25. MacOS
  26. BIOS/UEFI
  27. Network Adapter
  28. iOS
  29. Binary
  30. Keyboard Sniffer
  31. input
  32. Linux, Windows, iOS
  33. ARM
  34. Closed-Source
  35. Operating System (OS)
  36. System Software
  37. Hard Drive Device (HDD)
  38. Central Processing Unit (CPU)
  39. Examples of Unauthorized Use
  40. Application Software
  41. Graphics Processing Unit (GPU)
  42. Machine/Computer Language
  43. A Monitor Darkly
  44. Utility Software
  45. output
  46. monitor
  47. Examples of Authorized Use
  48. x86
  49. Shareware
  50. mouse