BootSectorVirusMultipartiteVirusResidentVirusWebScriptingVirusKeyloggerHackMultipartiteVirusResidentVirusSpacefillerVirusMacroVirusTrojanHorsesSpacefillerVirusPhishingDenialofServicesFakeWirelessAccessPoints(W.A.P)FakeWirelessAccessPoints(W.A.P)HackerSQLInjectionsBootSectorVirusBait andSwitchHackBait andSwitchHackBrowserHijackerWebScriptingVirusFree!MacroVirusTrojanHorsesDistributeDenial ofServicesWateringHoleAttacksTrojanPolymorphicVirusCookiesTheft ofCookiesTheft ofCookiesPhishingWateringHoleAttacksOverwriteVirusKeyloggerHackOverwriteVirusSQLInjectionsTrojanHackerDistributeDenial ofServicesDenialofServicesVirusCookiesPolymorphicVirusBrowserHijackerClickjackingHackVirusClickjackingHackBootSectorVirusMultipartiteVirusResidentVirusWebScriptingVirusKeyloggerHackMultipartiteVirusResidentVirusSpacefillerVirusMacroVirusTrojanHorsesSpacefillerVirusPhishingDenialofServicesFakeWirelessAccessPoints(W.A.P)FakeWirelessAccessPoints(W.A.P)HackerSQLInjectionsBootSectorVirusBait andSwitchHackBait andSwitchHackBrowserHijackerWebScriptingVirusFree!MacroVirusTrojanHorsesDistributeDenial ofServicesWateringHoleAttacksTrojanPolymorphicVirusCookiesTheft ofCookiesTheft ofCookiesPhishingWateringHoleAttacksOverwriteVirusKeyloggerHackOverwriteVirusSQLInjectionsTrojanHackerDistributeDenial ofServicesDenialofServicesVirusCookiesPolymorphicVirusBrowserHijackerClickjackingHackVirusClickjackingHack

Computer Virus Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Boot Sector Virus
  2. Multipartite Virus
  3. Resident Virus
  4. Web Scripting Virus
  5. Keylogger Hack
  6. Multipartite Virus
  7. Resident Virus
  8. Spacefiller Virus
  9. Macro Virus
  10. Trojan Horses
  11. Spacefiller Virus
  12. Phishing
  13. Denial of Services
  14. Fake Wireless Access Points (W.A.P)
  15. Fake Wireless Access Points (W.A.P)
  16. Hacker
  17. SQL Injections
  18. Boot Sector Virus
  19. Bait and Switch Hack
  20. Bait and Switch Hack
  21. Browser Hijacker
  22. Web Scripting Virus
  23. Free!
  24. Macro Virus
  25. Trojan Horses
  26. Distribute Denial of Services
  27. Watering Hole Attacks
  28. Trojan
  29. Polymorphic Virus
  30. Cookies
  31. Theft of Cookies
  32. Theft of Cookies
  33. Phishing
  34. Watering Hole Attacks
  35. Overwrite Virus
  36. Keylogger Hack
  37. Overwrite Virus
  38. SQL Injections
  39. Trojan
  40. Hacker
  41. Distribute Denial of Services
  42. Denial of Services
  43. Virus
  44. Cookies
  45. Polymorphic Virus
  46. Browser Hijacker
  47. Clickjacking Hack
  48. Virus
  49. Clickjacking Hack