CLIENT-SERVEROVERUSEPOP-UPWINDOWSDATATHEFTCREATINGMALWAREPOP-UPWINDOWSCRACKERSFILEINFECTORTHEFTCRASHINGOF THEDEVICEFAIRUSESCAMCOUNTERFEITINGCYBERSECURITYTHREATSENVIRONMENTALLIABILITIESSPEEDOFSYSTEMPRIVACYLIABILITIESINTERNETPIRACYCYBERSECURITYTHREATSEMPLOYEELIABILITIESHACKERSFILEINFECTORHARDWAREFAILURESSOFTWAREPIRACYCOMPUTERCRIMETRADESECRETWIRETAPPINGUSERERRORNETWORKVIRUSUNAUTHORIZEDACCESSCONTRACTUALLIABILITIESINSIDERTHREATSTHEFTCOPYRIGHTINSIDERTHREATSENDUSERPIRACYUNAUTHORIZEDACCESSENDUSERPIRACYDATATHEFTCRACKERSDATABREACHESANDPRIVACYVIOLATIONCOPYRIGHTHACKERSINTELLECTUALPROPERTYNETWORKVIRUSINTELLECTUALPROPERTYPLAGIARISMHARDWAREFAILURESCLICKFRAUDCOMPUTERCRIMESOFTWAREPIRACYPLAGIARISMCRASHINGOF THEDEVICEDMCADIGITALMILLENIUMCOPYRIGHTACTUSERERRORDATABREACHESANDPRIVACYVIOLATIONDMCADIGITALMILLENIUMCOPYRIGHTACTCOUNTERFEITINGCREATINGMALWAREINTERNETPIRACYCLIENT-SERVEROVERUSEPOP-UPWINDOWSDATATHEFTCREATINGMALWAREPOP-UPWINDOWSCRACKERSFILEINFECTORTHEFTCRASHINGOF THEDEVICEFAIRUSESCAMCOUNTERFEITINGCYBERSECURITYTHREATSENVIRONMENTALLIABILITIESSPEEDOFSYSTEMPRIVACYLIABILITIESINTERNETPIRACYCYBERSECURITYTHREATSEMPLOYEELIABILITIESHACKERSFILEINFECTORHARDWAREFAILURESSOFTWAREPIRACYCOMPUTERCRIMETRADESECRETWIRETAPPINGUSERERRORNETWORKVIRUSUNAUTHORIZEDACCESSCONTRACTUALLIABILITIESINSIDERTHREATSTHEFTCOPYRIGHTINSIDERTHREATSENDUSERPIRACYUNAUTHORIZEDACCESSENDUSERPIRACYDATATHEFTCRACKERSDATABREACHESANDPRIVACYVIOLATIONCOPYRIGHTHACKERSINTELLECTUALPROPERTYNETWORKVIRUSINTELLECTUALPROPERTYPLAGIARISMHARDWAREFAILURESCLICKFRAUDCOMPUTERCRIMESOFTWAREPIRACYPLAGIARISMCRASHINGOF THEDEVICEDMCADIGITALMILLENIUMCOPYRIGHTACTUSERERRORDATABREACHESANDPRIVACYVIOLATIONDMCADIGITALMILLENIUMCOPYRIGHTACTCOUNTERFEITINGCREATINGMALWAREINTERNETPIRACY

BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
  1. CLIENT-SERVER OVERUSE
  2. POP-UP WINDOWS
  3. DATA THEFT
  4. CREATING MALWARE
  5. POP-UP WINDOWS
  6. CRACKERS
  7. FILE INFECTOR
  8. THEFT
  9. CRASHING OF THE DEVICE
  10. FAIR USE
  11. SCAM
  12. COUNTERFEITING
  13. CYBERSECURITY THREATS
  14. ENVIRONMENTAL LIABILITIES
  15. SPEED OF SYSTEM
  16. PRIVACY LIABILITIES
  17. INTERNET PIRACY
  18. CYBERSECURITY THREATS
  19. EMPLOYEE LIABILITIES
  20. HACKERS
  21. FILE INFECTOR
  22. HARDWARE FAILURES
  23. SOFTWARE PIRACY
  24. COMPUTER CRIME
  25. TRADE SECRET
  26. WIRETAPPING
  27. USER ERROR
  28. NETWORK VIRUS
  29. UNAUTHORIZED ACCESS
  30. CONTRACTUAL LIABILITIES
  31. INSIDER THREATS
  32. THEFT
  33. COPY RIGHT
  34. INSIDER THREATS
  35. END USER PIRACY
  36. UNAUTHORIZED ACCESS
  37. END USER PIRACY
  38. DATA THEFT
  39. CRACKERS
  40. DATA BREACHES AND PRIVACY VIOLATION
  41. COPY RIGHT
  42. HACKERS
  43. INTELLECTUAL PROPERTY
  44. NETWORK VIRUS
  45. INTELLECTUAL PROPERTY
  46. PLAGIARISM
  47. HARDWARE FAILURES
  48. CLICK FRAUD
  49. COMPUTER CRIME
  50. SOFTWARE PIRACY
  51. PLAGIARISM
  52. CRASHING OF THE DEVICE
  53. DMCA DIGITAL MILLENIUM COPYRIGHT ACT
  54. USER ERROR
  55. DATA BREACHES AND PRIVACY VIOLATION
  56. DMCA DIGITAL MILLENIUM COPYRIGHT ACT
  57. COUNTERFEITING
  58. CREATING MALWARE
  59. INTERNET PIRACY