PLAGIARISMPOP-UPWINDOWSSPEEDOFSYSTEMDATATHEFTENDUSERPIRACYDATABREACHESANDPRIVACYVIOLATIONENVIRONMENTALLIABILITIESFILEINFECTORTHEFTCOUNTERFEITINGWIRETAPPINGCOMPUTERCRIMESOFTWAREPIRACYCONTRACTUALLIABILITIESCOUNTERFEITINGCOPYRIGHTENDUSERPIRACYCYBERSECURITYTHREATSCRASHINGOF THEDEVICECREATINGMALWARECOMPUTERCRIMECOPYRIGHTHARDWAREFAILURESHACKERSUSERERRORDMCADIGITALMILLENIUMCOPYRIGHTACTTHEFTFILEINFECTORSCAMFAIRUSECLIENT-SERVEROVERUSEINTERNETPIRACYINTELLECTUALPROPERTYCRACKERSINSIDERTHREATSPOP-UPWINDOWSCLICKFRAUDCRASHINGOF THEDEVICETRADESECRETCYBERSECURITYTHREATSINTERNETPIRACYINSIDERTHREATSEMPLOYEELIABILITIESUSERERRORNETWORKVIRUSCREATINGMALWAREUNAUTHORIZEDACCESSDATABREACHESANDPRIVACYVIOLATIONSOFTWAREPIRACYPLAGIARISMHARDWAREFAILURESPRIVACYLIABILITIESNETWORKVIRUSHACKERSDMCADIGITALMILLENIUMCOPYRIGHTACTINTELLECTUALPROPERTYUNAUTHORIZEDACCESSDATATHEFTCRACKERSPLAGIARISMPOP-UPWINDOWSSPEEDOFSYSTEMDATATHEFTENDUSERPIRACYDATABREACHESANDPRIVACYVIOLATIONENVIRONMENTALLIABILITIESFILEINFECTORTHEFTCOUNTERFEITINGWIRETAPPINGCOMPUTERCRIMESOFTWAREPIRACYCONTRACTUALLIABILITIESCOUNTERFEITINGCOPYRIGHTENDUSERPIRACYCYBERSECURITYTHREATSCRASHINGOF THEDEVICECREATINGMALWARECOMPUTERCRIMECOPYRIGHTHARDWAREFAILURESHACKERSUSERERRORDMCADIGITALMILLENIUMCOPYRIGHTACTTHEFTFILEINFECTORSCAMFAIRUSECLIENT-SERVEROVERUSEINTERNETPIRACYINTELLECTUALPROPERTYCRACKERSINSIDERTHREATSPOP-UPWINDOWSCLICKFRAUDCRASHINGOF THEDEVICETRADESECRETCYBERSECURITYTHREATSINTERNETPIRACYINSIDERTHREATSEMPLOYEELIABILITIESUSERERRORNETWORKVIRUSCREATINGMALWAREUNAUTHORIZEDACCESSDATABREACHESANDPRIVACYVIOLATIONSOFTWAREPIRACYPLAGIARISMHARDWAREFAILURESPRIVACYLIABILITIESNETWORKVIRUSHACKERSDMCADIGITALMILLENIUMCOPYRIGHTACTINTELLECTUALPROPERTYUNAUTHORIZEDACCESSDATATHEFTCRACKERS

BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
  1. PLAGIARISM
  2. POP-UP WINDOWS
  3. SPEED OF SYSTEM
  4. DATA THEFT
  5. END USER PIRACY
  6. DATA BREACHES AND PRIVACY VIOLATION
  7. ENVIRONMENTAL LIABILITIES
  8. FILE INFECTOR
  9. THEFT
  10. COUNTERFEITING
  11. WIRETAPPING
  12. COMPUTER CRIME
  13. SOFTWARE PIRACY
  14. CONTRACTUAL LIABILITIES
  15. COUNTERFEITING
  16. COPY RIGHT
  17. END USER PIRACY
  18. CYBERSECURITY THREATS
  19. CRASHING OF THE DEVICE
  20. CREATING MALWARE
  21. COMPUTER CRIME
  22. COPY RIGHT
  23. HARDWARE FAILURES
  24. HACKERS
  25. USER ERROR
  26. DMCA DIGITAL MILLENIUM COPYRIGHT ACT
  27. THEFT
  28. FILE INFECTOR
  29. SCAM
  30. FAIR USE
  31. CLIENT-SERVER OVERUSE
  32. INTERNET PIRACY
  33. INTELLECTUAL PROPERTY
  34. CRACKERS
  35. INSIDER THREATS
  36. POP-UP WINDOWS
  37. CLICK FRAUD
  38. CRASHING OF THE DEVICE
  39. TRADE SECRET
  40. CYBERSECURITY THREATS
  41. INTERNET PIRACY
  42. INSIDER THREATS
  43. EMPLOYEE LIABILITIES
  44. USER ERROR
  45. NETWORK VIRUS
  46. CREATING MALWARE
  47. UNAUTHORIZED ACCESS
  48. DATA BREACHES AND PRIVACY VIOLATION
  49. SOFTWARE PIRACY
  50. PLAGIARISM
  51. HARDWARE FAILURES
  52. PRIVACY LIABILITIES
  53. NETWORK VIRUS
  54. HACKERS
  55. DMCA DIGITAL MILLENIUM COPYRIGHT ACT
  56. INTELLECTUAL PROPERTY
  57. UNAUTHORIZED ACCESS
  58. DATA THEFT
  59. CRACKERS