(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
A collection of drawings, photos, and other images.
A program that warns or blocks a user from potentially fraudulent or suspicious websites.
A square-shaped coded graphic that corresponds to a web address or other information.
Software that is provided for use, modification, and redistribution that has no restrictions.
Software that provides the capabilities of paint software and modification of existing graphics.
Software that determines where users are spending their money.
A separate area of a hard disk that holds an infected file until the infection can be removed.
Malware that resides in active memory and replicates itself over a network to infect computers and devices.
An application that assist professionals and designers in creating engineering, architectural, and scientific designs and models.
A program that enables a user to perform maintenance type tasks.
An application that enables designers to create sophisticated publications that contain text, graphics, and many colors.
Copyrighted software that is distributed at no cost for a trial period.
A collection of individual applications available together as a unit.
The overlay of information and digital content on top of physical objects or locations.
Malware that can hide and allow someone to take full control of a computer from a remote location.
A tool that removes a program as well as any associated entries in the system files.
Destructive event or prank a virus was created to deliver.
Software that creates and analyzes an individual's tax forms.
A scam that sends an official looking email messages that attempts to obtain finanical/personal information.
The process of reorganizing a hard disk's file so that the files are stored in contiguous sectors.
Detects and protects a computer and its data from unauthorized intrusions.
A program designed to make users more productive and/or assist them with personal tasks.
A collection of data organized to allow access, retrieval, and use of data.