ResidentVirusFakeWirelessAccessPoints(W.A.P)VirusPolymorphicVirusMacroVirusMultipartiteVirusBait andSwitchHackClickjackingHackTrojanBrowserHijackerSpacefillerVirusMultipartiteVirusTrojanKeyloggerHackBootSectorVirusOverwriteVirusPhishingKeyloggerHackTheft ofCookiesWateringHoleAttacksFree!PolymorphicVirusDenialofServicesPhishingBrowserHijackerHackerWebScriptingVirusMacroVirusDistributeDenial ofServicesDenialofServicesTrojanHorsesCookiesVirusWateringHoleAttacksBootSectorVirusBait andSwitchHackSQLInjectionsHackerSpacefillerVirusTrojanHorsesClickjackingHackFakeWirelessAccessPoints(W.A.P)SQLInjectionsOverwriteVirusResidentVirusCookiesTheft ofCookiesWebScriptingVirusDistributeDenial ofServicesResidentVirusFakeWirelessAccessPoints(W.A.P)VirusPolymorphicVirusMacroVirusMultipartiteVirusBait andSwitchHackClickjackingHackTrojanBrowserHijackerSpacefillerVirusMultipartiteVirusTrojanKeyloggerHackBootSectorVirusOverwriteVirusPhishingKeyloggerHackTheft ofCookiesWateringHoleAttacksFree!PolymorphicVirusDenialofServicesPhishingBrowserHijackerHackerWebScriptingVirusMacroVirusDistributeDenial ofServicesDenialofServicesTrojanHorsesCookiesVirusWateringHoleAttacksBootSectorVirusBait andSwitchHackSQLInjectionsHackerSpacefillerVirusTrojanHorsesClickjackingHackFakeWirelessAccessPoints(W.A.P)SQLInjectionsOverwriteVirusResidentVirusCookiesTheft ofCookiesWebScriptingVirusDistributeDenial ofServices

Computer Virus Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Resident Virus
  2. Fake Wireless Access Points (W.A.P)
  3. Virus
  4. Polymorphic Virus
  5. Macro Virus
  6. Multipartite Virus
  7. Bait and Switch Hack
  8. Clickjacking Hack
  9. Trojan
  10. Browser Hijacker
  11. Spacefiller Virus
  12. Multipartite Virus
  13. Trojan
  14. Keylogger Hack
  15. Boot Sector Virus
  16. Overwrite Virus
  17. Phishing
  18. Keylogger Hack
  19. Theft of Cookies
  20. Watering Hole Attacks
  21. Free!
  22. Polymorphic Virus
  23. Denial of Services
  24. Phishing
  25. Browser Hijacker
  26. Hacker
  27. Web Scripting Virus
  28. Macro Virus
  29. Distribute Denial of Services
  30. Denial of Services
  31. Trojan Horses
  32. Cookies
  33. Virus
  34. Watering Hole Attacks
  35. Boot Sector Virus
  36. Bait and Switch Hack
  37. SQL Injections
  38. Hacker
  39. Spacefiller Virus
  40. Trojan Horses
  41. Clickjacking Hack
  42. Fake Wireless Access Points (W.A.P)
  43. SQL Injections
  44. Overwrite Virus
  45. Resident Virus
  46. Cookies
  47. Theft of Cookies
  48. Web Scripting Virus
  49. Distribute Denial of Services