COPYRIGHTDATABREACHESANDPRIVACYVIOLATIONENDUSERPIRACYCLIENT-SERVEROVERUSEFAIRUSEFILEINFECTORCONTRACTUALLIABILITIESINSIDERTHREATSCRASHINGOF THEDEVICECOPYRIGHTNETWORKVIRUSTHEFTDATABREACHESANDPRIVACYVIOLATIONCLICKFRAUDFILEINFECTORINSIDERTHREATSUSERERRORPOP-UPWINDOWSHARDWAREFAILURESEMPLOYEELIABILITIESPRIVACYLIABILITIESINTELLECTUALPROPERTYDMCADIGITALMILLENIUMCOPYRIGHTACTSOFTWAREPIRACYCRACKERSDATATHEFTCREATINGMALWARECOMPUTERCRIMESCAMINTELLECTUALPROPERTYPLAGIARISMCYBERSECURITYTHREATSUSERERRORENDUSERPIRACYPLAGIARISMDMCADIGITALMILLENIUMCOPYRIGHTACTWIRETAPPINGTRADESECRETHACKERSCREATINGMALWARESPEEDOFSYSTEMUNAUTHORIZEDACCESSCRACKERSCYBERSECURITYTHREATSINTERNETPIRACYINTERNETPIRACYCOUNTERFEITINGTHEFTHACKERSCRASHINGOF THEDEVICESOFTWAREPIRACYNETWORKVIRUSCOUNTERFEITINGUNAUTHORIZEDACCESSHARDWAREFAILURESPOP-UPWINDOWSENVIRONMENTALLIABILITIESCOMPUTERCRIMEDATATHEFTCOPYRIGHTDATABREACHESANDPRIVACYVIOLATIONENDUSERPIRACYCLIENT-SERVEROVERUSEFAIRUSEFILEINFECTORCONTRACTUALLIABILITIESINSIDERTHREATSCRASHINGOF THEDEVICECOPYRIGHTNETWORKVIRUSTHEFTDATABREACHESANDPRIVACYVIOLATIONCLICKFRAUDFILEINFECTORINSIDERTHREATSUSERERRORPOP-UPWINDOWSHARDWAREFAILURESEMPLOYEELIABILITIESPRIVACYLIABILITIESINTELLECTUALPROPERTYDMCADIGITALMILLENIUMCOPYRIGHTACTSOFTWAREPIRACYCRACKERSDATATHEFTCREATINGMALWARECOMPUTERCRIMESCAMINTELLECTUALPROPERTYPLAGIARISMCYBERSECURITYTHREATSUSERERRORENDUSERPIRACYPLAGIARISMDMCADIGITALMILLENIUMCOPYRIGHTACTWIRETAPPINGTRADESECRETHACKERSCREATINGMALWARESPEEDOFSYSTEMUNAUTHORIZEDACCESSCRACKERSCYBERSECURITYTHREATSINTERNETPIRACYINTERNETPIRACYCOUNTERFEITINGTHEFTHACKERSCRASHINGOF THEDEVICESOFTWAREPIRACYNETWORKVIRUSCOUNTERFEITINGUNAUTHORIZEDACCESSHARDWAREFAILURESPOP-UPWINDOWSENVIRONMENTALLIABILITIESCOMPUTERCRIMEDATATHEFT

BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
  1. COPY RIGHT
  2. DATA BREACHES AND PRIVACY VIOLATION
  3. END USER PIRACY
  4. CLIENT-SERVER OVERUSE
  5. FAIR USE
  6. FILE INFECTOR
  7. CONTRACTUAL LIABILITIES
  8. INSIDER THREATS
  9. CRASHING OF THE DEVICE
  10. COPY RIGHT
  11. NETWORK VIRUS
  12. THEFT
  13. DATA BREACHES AND PRIVACY VIOLATION
  14. CLICK FRAUD
  15. FILE INFECTOR
  16. INSIDER THREATS
  17. USER ERROR
  18. POP-UP WINDOWS
  19. HARDWARE FAILURES
  20. EMPLOYEE LIABILITIES
  21. PRIVACY LIABILITIES
  22. INTELLECTUAL PROPERTY
  23. DMCA DIGITAL MILLENIUM COPYRIGHT ACT
  24. SOFTWARE PIRACY
  25. CRACKERS
  26. DATA THEFT
  27. CREATING MALWARE
  28. COMPUTER CRIME
  29. SCAM
  30. INTELLECTUAL PROPERTY
  31. PLAGIARISM
  32. CYBERSECURITY THREATS
  33. USER ERROR
  34. END USER PIRACY
  35. PLAGIARISM
  36. DMCA DIGITAL MILLENIUM COPYRIGHT ACT
  37. WIRETAPPING
  38. TRADE SECRET
  39. HACKERS
  40. CREATING MALWARE
  41. SPEED OF SYSTEM
  42. UNAUTHORIZED ACCESS
  43. CRACKERS
  44. CYBERSECURITY THREATS
  45. INTERNET PIRACY
  46. INTERNET PIRACY
  47. COUNTERFEITING
  48. THEFT
  49. HACKERS
  50. CRASHING OF THE DEVICE
  51. SOFTWARE PIRACY
  52. NETWORK VIRUS
  53. COUNTERFEITING
  54. UNAUTHORIZED ACCESS
  55. HARDWARE FAILURES
  56. POP-UP WINDOWS
  57. ENVIRONMENTAL LIABILITIES
  58. COMPUTER CRIME
  59. DATA THEFT