Passphrase Icon Mac Spyware Portal Blackberry Netscape Navigation bar Encryption Desktop Password manager Smart Phone Spoofing Updates Modem Cache Adware URL Worm CAPTCHA Phishing Internet of Things (IOT) Safari HP Monitor Online Chips RAM Internet Explorer Google Trojan SPAM Lynx Zero- day Threat Mouse The Cloud playstation Scareware Port Offline Andriod White Hat ARPANET ISM Broadband Hacker Computer Network Black Hat Cookies Flip Phone Webmail Rootkits Gaming X- Box Microsoft Browser Download Laptop Firewall Atari Apple IOS Microprocessor Brute Force Attack Smart Watch Napster Password Hacktivist AOL CPU World Wide Web Bandwidth StarTAC Keyloggers Passphrase Icon Mac Spyware Portal Blackberry Netscape Navigation bar Encryption Desktop Password manager Smart Phone Spoofing Updates Modem Cache Adware URL Worm CAPTCHA Phishing Internet of Things (IOT) Safari HP Monitor Online Chips RAM Internet Explorer Google Trojan SPAM Lynx Zero- day Threat Mouse The Cloud playstation Scareware Port Offline Andriod White Hat ARPANET ISM Broadband Hacker Computer Network Black Hat Cookies Flip Phone Webmail Rootkits Gaming X- Box Microsoft Browser Download Laptop Firewall Atari Apple IOS Microprocessor Brute Force Attack Smart Watch Napster Password Hacktivist AOL CPU World Wide Web Bandwidth StarTAC Keyloggers
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Passphrase
Icon
Mac
Spyware
Portal
Blackberry
Netscape
Navigation bar
Encryption
Desktop
Password manager
Smart Phone
Spoofing
Updates
Modem
Cache
Adware
URL
Worm
CAPTCHA
Phishing
Internet of Things (IOT)
Safari
HP
Monitor
Online
Chips
RAM
Internet Explorer
Google
Trojan
SPAM
Lynx
Zero-day Threat
Mouse
The Cloud
playstation
Scareware
Port
Offline
Andriod
White Hat
ARPANET
ISM
Broadband
Hacker
Computer Network
Black Hat
Cookies
Flip Phone
Webmail
Rootkits
Gaming
X-Box
Microsoft
Browser
Download
Laptop
Firewall
Atari
Apple IOS
Microprocessor
Brute Force Attack
Smart Watch
Napster
Password
Hacktivist
AOL
CPU
World Wide Web
Bandwidth
StarTAC
Keyloggers