UsernameTinselIoTNetworksiMacVPNFeastMP3InfrastructureAcademicMiFiChestnutsStockingsXmasTreeServerInformationMistletoeSpywareManagementTabletiPadLaptopPasswordScroogeElvesWinterSnowmanHollyHolidayOffice365JingleBellsAngelSantaReindeerCybersecurityTechnologyJollyComputerScamIPAdressSleighClientHTMLiPhoneRudolphApplicationsSecurityProjectWiFiCarolersEnterpriseIOSPhishingTwo-FactorServicesLabsSpamSoftwareGrinchTrojanHorseUsernameTinselIoTNetworksiMacVPNFeastMP3InfrastructureAcademicMiFiChestnutsStockingsXmasTreeServerInformationMistletoeSpywareManagementTabletiPadLaptopPasswordScroogeElvesWinterSnowmanHollyHolidayOffice365JingleBellsAngelSantaReindeerCybersecurityTechnologyJollyComputerScamIPAdressSleighClientHTMLiPhoneRudolphApplicationsSecurityProjectWiFiCarolersEnterpriseIOSPhishingTwo-FactorServicesLabsSpamSoftwareGrinchTrojanHorse

Office of Information Technology - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
  1. Username
  2. Tinsel
  3. IoT
  4. Networks
  5. iMac
  6. VPN
  7. Feast
  8. MP3
  9. Infrastructure
  10. Academic
  11. MiFi
  12. Chestnuts
  13. Stockings
  14. Xmas Tree
  15. Server
  16. Information
  17. Mistletoe
  18. Spyware
  19. Management
  20. Tablet
  21. iPad
  22. Laptop
  23. Password
  24. Scrooge
  25. Elves
  26. Winter
  27. Snowman
  28. Holly
  29. Holiday
  30. Office 365
  31. Jingle Bells
  32. Angel
  33. Santa
  34. Reindeer
  35. Cybersecurity
  36. Technology
  37. Jolly
  38. Computer
  39. Scam
  40. IP Adress
  41. Sleigh
  42. Client
  43. HTML
  44. iPhone
  45. Rudolph
  46. Applications
  47. Security
  48. Project
  49. WiFi
  50. Carolers
  51. Enterprise
  52. IOS
  53. Phishing
  54. Two-Factor
  55. Services
  56. Labs
  57. Spam
  58. Software
  59. Grinch
  60. Trojan Horse