CRASHINGOF THEDEVICETHEFTCOMPUTERCRIMEWIRETAPPINGSOFTWAREPIRACYCYBERSECURITYTHREATSCOMPUTERCRIMEHACKERSCONTRACTUALLIABILITIESDATABREACHESANDPRIVACYVIOLATIONINSIDERTHREATSCRACKERSHARDWAREFAILURESINTELLECTUALPROPERTYSCAMCRASHINGOF THEDEVICEINTERNETPIRACYDATABREACHESANDPRIVACYVIOLATIONPOP-UPWINDOWSCREATINGMALWARENETWORKVIRUSCYBERSECURITYTHREATSENVIRONMENTALLIABILITIESHARDWAREFAILURESINSIDERTHREATSCLICKFRAUDTRADESECRETDMCADIGITALMILLENIUMCOPYRIGHTACTSPEEDOFSYSTEMUSERERRORPLAGIARISMUNAUTHORIZEDACCESSCRACKERSNETWORKVIRUSCOPYRIGHTENDUSERPIRACYCREATINGMALWAREENDUSERPIRACYFILEINFECTORDATATHEFTCOUNTERFEITINGDMCADIGITALMILLENIUMCOPYRIGHTACTCOPYRIGHTPLAGIARISMTHEFTCOUNTERFEITINGINTELLECTUALPROPERTYSOFTWAREPIRACYPOP-UPWINDOWSPRIVACYLIABILITIESFAIRUSEINTERNETPIRACYUNAUTHORIZEDACCESSHACKERSEMPLOYEELIABILITIESCLIENT-SERVEROVERUSEDATATHEFTFILEINFECTORUSERERRORCRASHINGOF THEDEVICETHEFTCOMPUTERCRIMEWIRETAPPINGSOFTWAREPIRACYCYBERSECURITYTHREATSCOMPUTERCRIMEHACKERSCONTRACTUALLIABILITIESDATABREACHESANDPRIVACYVIOLATIONINSIDERTHREATSCRACKERSHARDWAREFAILURESINTELLECTUALPROPERTYSCAMCRASHINGOF THEDEVICEINTERNETPIRACYDATABREACHESANDPRIVACYVIOLATIONPOP-UPWINDOWSCREATINGMALWARENETWORKVIRUSCYBERSECURITYTHREATSENVIRONMENTALLIABILITIESHARDWAREFAILURESINSIDERTHREATSCLICKFRAUDTRADESECRETDMCADIGITALMILLENIUMCOPYRIGHTACTSPEEDOFSYSTEMUSERERRORPLAGIARISMUNAUTHORIZEDACCESSCRACKERSNETWORKVIRUSCOPYRIGHTENDUSERPIRACYCREATINGMALWAREENDUSERPIRACYFILEINFECTORDATATHEFTCOUNTERFEITINGDMCADIGITALMILLENIUMCOPYRIGHTACTCOPYRIGHTPLAGIARISMTHEFTCOUNTERFEITINGINTELLECTUALPROPERTYSOFTWAREPIRACYPOP-UPWINDOWSPRIVACYLIABILITIESFAIRUSEINTERNETPIRACYUNAUTHORIZEDACCESSHACKERSEMPLOYEELIABILITIESCLIENT-SERVEROVERUSEDATATHEFTFILEINFECTORUSERERROR

BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
  1. CRASHING OF THE DEVICE
  2. THEFT
  3. COMPUTER CRIME
  4. WIRETAPPING
  5. SOFTWARE PIRACY
  6. CYBERSECURITY THREATS
  7. COMPUTER CRIME
  8. HACKERS
  9. CONTRACTUAL LIABILITIES
  10. DATA BREACHES AND PRIVACY VIOLATION
  11. INSIDER THREATS
  12. CRACKERS
  13. HARDWARE FAILURES
  14. INTELLECTUAL PROPERTY
  15. SCAM
  16. CRASHING OF THE DEVICE
  17. INTERNET PIRACY
  18. DATA BREACHES AND PRIVACY VIOLATION
  19. POP-UP WINDOWS
  20. CREATING MALWARE
  21. NETWORK VIRUS
  22. CYBERSECURITY THREATS
  23. ENVIRONMENTAL LIABILITIES
  24. HARDWARE FAILURES
  25. INSIDER THREATS
  26. CLICK FRAUD
  27. TRADE SECRET
  28. DMCA DIGITAL MILLENIUM COPYRIGHT ACT
  29. SPEED OF SYSTEM
  30. USER ERROR
  31. PLAGIARISM
  32. UNAUTHORIZED ACCESS
  33. CRACKERS
  34. NETWORK VIRUS
  35. COPY RIGHT
  36. END USER PIRACY
  37. CREATING MALWARE
  38. END USER PIRACY
  39. FILE INFECTOR
  40. DATA THEFT
  41. COUNTERFEITING
  42. DMCA DIGITAL MILLENIUM COPYRIGHT ACT
  43. COPY RIGHT
  44. PLAGIARISM
  45. THEFT
  46. COUNTERFEITING
  47. INTELLECTUAL PROPERTY
  48. SOFTWARE PIRACY
  49. POP-UP WINDOWS
  50. PRIVACY LIABILITIES
  51. FAIR USE
  52. INTERNET PIRACY
  53. UNAUTHORIZED ACCESS
  54. HACKERS
  55. EMPLOYEE LIABILITIES
  56. CLIENT-SERVER OVERUSE
  57. DATA THEFT
  58. FILE INFECTOR
  59. USER ERROR