Free!KeyloggerHackBrowserHijackerTheft ofCookiesWebScriptingVirusResidentVirusPhishingWebScriptingVirusCookiesPolymorphicVirusBait andSwitchHackVirusClickjackingHackTrojanPolymorphicVirusTrojanBait andSwitchHackFakeWirelessAccessPoints(W.A.P)HackerClickjackingHackTrojanHorsesKeyloggerHackDistributeDenial ofServicesMultipartiteVirusHackerWateringHoleAttacksDenialofServicesDistributeDenial ofServicesOverwriteVirusBootSectorVirusCookiesTheft ofCookiesOverwriteVirusResidentVirusSQLInjectionsPhishingSpacefillerVirusFakeWirelessAccessPoints(W.A.P)SpacefillerVirusMacroVirusBrowserHijackerMacroVirusSQLInjectionsTrojanHorsesBootSectorVirusDenialofServicesWateringHoleAttacksMultipartiteVirusVirusFree!KeyloggerHackBrowserHijackerTheft ofCookiesWebScriptingVirusResidentVirusPhishingWebScriptingVirusCookiesPolymorphicVirusBait andSwitchHackVirusClickjackingHackTrojanPolymorphicVirusTrojanBait andSwitchHackFakeWirelessAccessPoints(W.A.P)HackerClickjackingHackTrojanHorsesKeyloggerHackDistributeDenial ofServicesMultipartiteVirusHackerWateringHoleAttacksDenialofServicesDistributeDenial ofServicesOverwriteVirusBootSectorVirusCookiesTheft ofCookiesOverwriteVirusResidentVirusSQLInjectionsPhishingSpacefillerVirusFakeWirelessAccessPoints(W.A.P)SpacefillerVirusMacroVirusBrowserHijackerMacroVirusSQLInjectionsTrojanHorsesBootSectorVirusDenialofServicesWateringHoleAttacksMultipartiteVirusVirus

Computer Virus Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Free!
  2. Keylogger Hack
  3. Browser Hijacker
  4. Theft of Cookies
  5. Web Scripting Virus
  6. Resident Virus
  7. Phishing
  8. Web Scripting Virus
  9. Cookies
  10. Polymorphic Virus
  11. Bait and Switch Hack
  12. Virus
  13. Clickjacking Hack
  14. Trojan
  15. Polymorphic Virus
  16. Trojan
  17. Bait and Switch Hack
  18. Fake Wireless Access Points (W.A.P)
  19. Hacker
  20. Clickjacking Hack
  21. Trojan Horses
  22. Keylogger Hack
  23. Distribute Denial of Services
  24. Multipartite Virus
  25. Hacker
  26. Watering Hole Attacks
  27. Denial of Services
  28. Distribute Denial of Services
  29. Overwrite Virus
  30. Boot Sector Virus
  31. Cookies
  32. Theft of Cookies
  33. Overwrite Virus
  34. Resident Virus
  35. SQL Injections
  36. Phishing
  37. Spacefiller Virus
  38. Fake Wireless Access Points (W.A.P)
  39. Spacefiller Virus
  40. Macro Virus
  41. Browser Hijacker
  42. Macro Virus
  43. SQL Injections
  44. Trojan Horses
  45. Boot Sector Virus
  46. Denial of Services
  47. Watering Hole Attacks
  48. Multipartite Virus
  49. Virus