ProjectTabletTechnologyOffice365ReindeerServerMP3SpamIoTUsernameCybersecurityHollyIOSSleighMistletoeTinselInformationCarolersSantaiPadServicesPasswordScamJollyGrinchInfrastructureSecurityHolidayScroogeEnterpriseWinterAcademicStockingsLabsJingleBellsManagementAngelNetworksPhishingVPNMiFiTrojanHorseIPAdressHTMLFeastXmasTreeRudolphComputerLaptopTwo-FactorClientiPhoneWiFiChestnutsElvesSoftwareSnowmanSpywareApplicationsiMacProjectTabletTechnologyOffice365ReindeerServerMP3SpamIoTUsernameCybersecurityHollyIOSSleighMistletoeTinselInformationCarolersSantaiPadServicesPasswordScamJollyGrinchInfrastructureSecurityHolidayScroogeEnterpriseWinterAcademicStockingsLabsJingleBellsManagementAngelNetworksPhishingVPNMiFiTrojanHorseIPAdressHTMLFeastXmasTreeRudolphComputerLaptopTwo-FactorClientiPhoneWiFiChestnutsElvesSoftwareSnowmanSpywareApplicationsiMac

Office of Information Technology - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
  1. Project
  2. Tablet
  3. Technology
  4. Office 365
  5. Reindeer
  6. Server
  7. MP3
  8. Spam
  9. IoT
  10. Username
  11. Cybersecurity
  12. Holly
  13. IOS
  14. Sleigh
  15. Mistletoe
  16. Tinsel
  17. Information
  18. Carolers
  19. Santa
  20. iPad
  21. Services
  22. Password
  23. Scam
  24. Jolly
  25. Grinch
  26. Infrastructure
  27. Security
  28. Holiday
  29. Scrooge
  30. Enterprise
  31. Winter
  32. Academic
  33. Stockings
  34. Labs
  35. Jingle Bells
  36. Management
  37. Angel
  38. Networks
  39. Phishing
  40. VPN
  41. MiFi
  42. Trojan Horse
  43. IP Adress
  44. HTML
  45. Feast
  46. Xmas Tree
  47. Rudolph
  48. Computer
  49. Laptop
  50. Two-Factor
  51. Client
  52. iPhone
  53. WiFi
  54. Chestnuts
  55. Elves
  56. Software
  57. Snowman
  58. Spyware
  59. Applications
  60. iMac