PortalWormRootkitsLynxAdwareSPAMBandwidthPasswordmanagerNapsterSpywareStarTACWhiteHatMouseLaptopAOLKeyloggersHacktivistWebmailGamingBlackberryChipsSafariCPUHackerAndriodUpdatesEncryptionMicroprocessorBrowserPasswordHPNetscapeModemBroadbandPassphraseISMPortGoogleScarewareOfflineURLCacheDesktopFlipPhoneInternetof Things(IOT)WorldWideWebMonitorSmartWatchIconZero-dayThreatPhishingBruteForceAttackCookiesTheCloudOnlineX-BoxInternetExplorerBlackHatComputerNetworkDownloadARPANETAtariRAMTrojanAppleIOSFirewallMacNavigationbarPlayStationCAPTCHASpoofingSmartPhoneMicrosoftPortalWormRootkitsLynxAdwareSPAMBandwidthPasswordmanagerNapsterSpywareStarTACWhiteHatMouseLaptopAOLKeyloggersHacktivistWebmailGamingBlackberryChipsSafariCPUHackerAndriodUpdatesEncryptionMicroprocessorBrowserPasswordHPNetscapeModemBroadbandPassphraseISMPortGoogleScarewareOfflineURLCacheDesktopFlipPhoneInternetof Things(IOT)WorldWideWebMonitorSmartWatchIconZero-dayThreatPhishingBruteForceAttackCookiesTheCloudOnlineX-BoxInternetExplorerBlackHatComputerNetworkDownloadARPANETAtariRAMTrojanAppleIOSFirewallMacNavigationbarPlayStationCAPTCHASpoofingSmartPhoneMicrosoft

Tech Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
  1. Portal
  2. Worm
  3. Rootkits
  4. Lynx
  5. Adware
  6. SPAM
  7. Bandwidth
  8. Password manager
  9. Napster
  10. Spyware
  11. StarTAC
  12. White Hat
  13. Mouse
  14. Laptop
  15. AOL
  16. Keyloggers
  17. Hacktivist
  18. Webmail
  19. Gaming
  20. Blackberry
  21. Chips
  22. Safari
  23. CPU
  24. Hacker
  25. Andriod
  26. Updates
  27. Encryption
  28. Microprocessor
  29. Browser
  30. Password
  31. HP
  32. Netscape
  33. Modem
  34. Broadband
  35. Passphrase
  36. ISM
  37. Port
  38. Google
  39. Scareware
  40. Offline
  41. URL
  42. Cache
  43. Desktop
  44. Flip Phone
  45. Internet of Things (IOT)
  46. World Wide Web
  47. Monitor
  48. Smart Watch
  49. Icon
  50. Zero-day Threat
  51. Phishing
  52. Brute Force Attack
  53. Cookies
  54. The Cloud
  55. Online
  56. X-Box
  57. Internet Explorer
  58. Black Hat
  59. Computer Network
  60. Download
  61. ARPANET
  62. Atari
  63. RAM
  64. Trojan
  65. Apple IOS
  66. Firewall
  67. Mac
  68. Navigation bar
  69. PlayStation
  70. CAPTCHA
  71. Spoofing
  72. Smart Phone
  73. Microsoft