SQLInjectionsBait andSwitchHackDenialofServicesDistributeDenial ofServicesPolymorphicVirusTrojanCookiesPolymorphicVirusDistributeDenial ofServicesTrojanHorsesSQLInjectionsTheft ofCookiesResidentVirusWateringHoleAttacksFakeWirelessAccessPoints(W.A.P)ClickjackingHackWateringHoleAttacksHackerResidentVirusBootSectorVirusWebScriptingVirusMultipartiteVirusSpacefillerVirusKeyloggerHackCookiesOverwriteVirusVirusVirusBrowserHijackerFakeWirelessAccessPoints(W.A.P)DenialofServicesClickjackingHackPhishingWebScriptingVirusSpacefillerVirusMultipartiteVirusKeyloggerHackBrowserHijackerHackerTheft ofCookiesBait andSwitchHackMacroVirusFree!PhishingTrojanMacroVirusTrojanHorsesOverwriteVirusBootSectorVirusSQLInjectionsBait andSwitchHackDenialofServicesDistributeDenial ofServicesPolymorphicVirusTrojanCookiesPolymorphicVirusDistributeDenial ofServicesTrojanHorsesSQLInjectionsTheft ofCookiesResidentVirusWateringHoleAttacksFakeWirelessAccessPoints(W.A.P)ClickjackingHackWateringHoleAttacksHackerResidentVirusBootSectorVirusWebScriptingVirusMultipartiteVirusSpacefillerVirusKeyloggerHackCookiesOverwriteVirusVirusVirusBrowserHijackerFakeWirelessAccessPoints(W.A.P)DenialofServicesClickjackingHackPhishingWebScriptingVirusSpacefillerVirusMultipartiteVirusKeyloggerHackBrowserHijackerHackerTheft ofCookiesBait andSwitchHackMacroVirusFree!PhishingTrojanMacroVirusTrojanHorsesOverwriteVirusBootSectorVirus

Computer Virus Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. SQL Injections
  2. Bait and Switch Hack
  3. Denial of Services
  4. Distribute Denial of Services
  5. Polymorphic Virus
  6. Trojan
  7. Cookies
  8. Polymorphic Virus
  9. Distribute Denial of Services
  10. Trojan Horses
  11. SQL Injections
  12. Theft of Cookies
  13. Resident Virus
  14. Watering Hole Attacks
  15. Fake Wireless Access Points (W.A.P)
  16. Clickjacking Hack
  17. Watering Hole Attacks
  18. Hacker
  19. Resident Virus
  20. Boot Sector Virus
  21. Web Scripting Virus
  22. Multipartite Virus
  23. Spacefiller Virus
  24. Keylogger Hack
  25. Cookies
  26. Overwrite Virus
  27. Virus
  28. Virus
  29. Browser Hijacker
  30. Fake Wireless Access Points (W.A.P)
  31. Denial of Services
  32. Clickjacking Hack
  33. Phishing
  34. Web Scripting Virus
  35. Spacefiller Virus
  36. Multipartite Virus
  37. Keylogger Hack
  38. Browser Hijacker
  39. Hacker
  40. Theft of Cookies
  41. Bait and Switch Hack
  42. Macro Virus
  43. Free!
  44. Phishing
  45. Trojan
  46. Macro Virus
  47. Trojan Horses
  48. Overwrite Virus
  49. Boot Sector Virus