DownloadOperatingsystemBookmarkModemCloudcomputingRead-onlyOperatingsystemGIFBandwidthServerINTERNETURLFirewallCLOUDCOMPUTINGDomainDevicedriverSearchengineBack-endDevicedriverPROCESSORAttachmentBACKWARDCOMPTIBLESSLFIREWALLBandwidthPOPMALWAREPOPEmailHTMLCOMPRESSIONChipCADDVGatewayCybersecurityUnzipCPUCompressionPPMADSLVirusJavaCPUBrowserMEGABYTESEODownloadSEOISPCYBERCRIMEWPAISPAnalogueRead-onlyROMBouncebackBluetoothPPMAnalogueHomepageBitHarddiskEthernetWPAMegahertzADSLProtocolEthernetModemBrowserPhishingBitBACK-ENDONLINEGIFWi-FiResolutionMegahertzViralLANSearchengineIntranetFTPPROCESSORSSLEncryptionHomepageGatewayOnlineJPEGSAASCookieHarddiskPDFRAMFTPVIRUSContentJavaCybersecurityCHIPSpamBooleanoperatorsCACHEAttachmentInternetASSITIVETECHNOLOGYProtocolWEPIntranetCookiePlug-inMegabyteROMJPEGContentRESOLUTIONMalwareWi-FiLANAdobeAcrobatReaderBookmarkBluetoothURLCacheWEPPlug-inAssistivetechnologyDVBooleanoperatorsEncryptionViralSPAMPDFServerBouncebackRAMPhishingAdobeAcrobatReaderEmailDomainDownloadOperatingsystemBookmarkModemCloudcomputingRead-onlyOperatingsystemGIFBandwidthServerINTERNETURLFirewallCLOUDCOMPUTINGDomainDevicedriverSearchengineBack-endDevicedriverPROCESSORAttachmentBACKWARDCOMPTIBLESSLFIREWALLBandwidthPOPMALWAREPOPEmailHTMLCOMPRESSIONChipCADDVGatewayCybersecurityUnzipCPUCompressionPPMADSLVirusJavaCPUBrowserMEGABYTESEODownloadSEOISPCYBERCRIMEWPAISPAnalogueRead-onlyROMBouncebackBluetoothPPMAnalogueHomepageBitHarddiskEthernetWPAMegahertzADSLProtocolEthernetModemBrowserPhishingBitBACK-ENDONLINEGIFWi-FiResolutionMegahertzViralLANSearchengineIntranetFTPPROCESSORSSLEncryptionHomepageGatewayOnlineJPEGSAASCookieHarddiskPDFRAMFTPVIRUSContentJavaCybersecurityCHIPSpamBooleanoperatorsCACHEAttachmentInternetASSITIVETECHNOLOGYProtocolWEPIntranetCookiePlug-inMegabyteROMJPEGContentRESOLUTIONMalwareWi-FiLANAdobeAcrobatReaderBookmarkBluetoothURLCacheWEPPlug-inAssistivetechnologyDVBooleanoperatorsEncryptionViralSPAMPDFServerBouncebackRAMPhishingAdobeAcrobatReaderEmailDomain

ICT TERMS - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
  1. Download
  2. Operating system
  3. Bookmark
  4. Modem
  5. Cloud computing
  6. Read-only
  7. Operating system
  8. GIF
  9. Bandwidth
  10. Server
  11. INTERNET
  12. URL
  13. Firewall
  14. CLOUD COMPUTING
  15. Domain
  16. Device driver
  17. Search engine
  18. Back-end
  19. Device driver
  20. PROCESSOR
  21. Attachment
  22. BACKWARD COMPTIBLE
  23. SSL
  24. FIREWALL
  25. Bandwidth
  26. POP
  27. MALWARE
  28. POP
  29. Email
  30. HTML
  31. COMPRESSION
  32. Chip
  33. CAD
  34. DV
  35. Gateway
  36. Cybersecurity
  37. Unzip
  38. CPU
  39. Compression
  40. PPM
  41. ADSL
  42. Virus
  43. Java
  44. CPU
  45. Browser
  46. MEGABYTE
  47. SEO
  48. Download
  49. SEO
  50. ISP
  51. CYBER CRIME
  52. WPA
  53. ISP
  54. Analogue
  55. Read-only
  56. ROM
  57. Bounce back
  58. Bluetooth
  59. PPM
  60. Analogue
  61. Home page
  62. Bit
  63. Hard disk
  64. Ethernet
  65. WPA
  66. Megahertz
  67. ADSL
  68. Protocol
  69. Ethernet
  70. Modem
  71. Browser
  72. Phishing
  73. Bit
  74. BACK-END
  75. ONLINE
  76. GIF
  77. Wi-Fi
  78. Resolution
  79. Megahertz
  80. Viral
  81. LAN
  82. Search engine
  83. Intranet
  84. FTP
  85. PROCESSOR
  86. SSL
  87. Encryption
  88. Home page
  89. Gateway
  90. Online
  91. JPEG
  92. SAAS
  93. Cookie
  94. Hard disk
  95. PDF
  96. RAM
  97. FTP
  98. VIRUS
  99. Content
  100. Java
  101. Cybersecurity
  102. CHIP
  103. Spam
  104. Boolean operators
  105. CACHE
  106. Attachment
  107. Internet
  108. ASSITIVE TECHNOLOGY
  109. Protocol
  110. WEP
  111. Intranet
  112. Cookie
  113. Plug-in
  114. Megabyte
  115. ROM
  116. JPEG
  117. Content
  118. RESOLUTION
  119. Malware
  120. Wi-Fi
  121. LAN
  122. Adobe Acrobat Reader
  123. Bookmark
  124. Bluetooth
  125. URL
  126. Cache
  127. WEP
  128. Plug-in
  129. Assistive technology
  130. DV
  131. Boolean operators
  132. Encryption
  133. Viral
  134. SPAM
  135. PDF
  136. Server
  137. Bounce back
  138. RAM
  139. Phishing
  140. Adobe Acrobat Reader
  141. Email
  142. Domain