SmartPhoneTrojanARPANETBlackberryOnlineHPMicrosoftURLBlackHatDownloadSafariCAPTCHANavigationbarSmartWatchMacGamingChipsPlayStationWorldWideWebLaptopBandwidthBroadbandStarTACNetscapeWhiteHatRootkitsScarewareAppleIOSHacktivistPasswordmanagerPortTheCloudKeyloggersBruteForceAttackPasswordCookiesDesktopFirewallOfflineModemISMMicroprocessorWebmailMonitorAdwareFlipPhonePassphraseGoogleSPAMPhishingAOLWormUpdatesMouseEncryptionZero-dayThreatInternetof Things(IOT)NapsterPortalBrowserSpywareInternetExplorerCPUAtariComputerNetworkLynxCacheAndriodRAMSpoofingHackerX-BoxIconSmartPhoneTrojanARPANETBlackberryOnlineHPMicrosoftURLBlackHatDownloadSafariCAPTCHANavigationbarSmartWatchMacGamingChipsPlayStationWorldWideWebLaptopBandwidthBroadbandStarTACNetscapeWhiteHatRootkitsScarewareAppleIOSHacktivistPasswordmanagerPortTheCloudKeyloggersBruteForceAttackPasswordCookiesDesktopFirewallOfflineModemISMMicroprocessorWebmailMonitorAdwareFlipPhonePassphraseGoogleSPAMPhishingAOLWormUpdatesMouseEncryptionZero-dayThreatInternetof Things(IOT)NapsterPortalBrowserSpywareInternetExplorerCPUAtariComputerNetworkLynxCacheAndriodRAMSpoofingHackerX-BoxIcon

Tech Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
  1. Smart Phone
  2. Trojan
  3. ARPANET
  4. Blackberry
  5. Online
  6. HP
  7. Microsoft
  8. URL
  9. Black Hat
  10. Download
  11. Safari
  12. CAPTCHA
  13. Navigation bar
  14. Smart Watch
  15. Mac
  16. Gaming
  17. Chips
  18. PlayStation
  19. World Wide Web
  20. Laptop
  21. Bandwidth
  22. Broadband
  23. StarTAC
  24. Netscape
  25. White Hat
  26. Rootkits
  27. Scareware
  28. Apple IOS
  29. Hacktivist
  30. Password manager
  31. Port
  32. The Cloud
  33. Keyloggers
  34. Brute Force Attack
  35. Password
  36. Cookies
  37. Desktop
  38. Firewall
  39. Offline
  40. Modem
  41. ISM
  42. Microprocessor
  43. Webmail
  44. Monitor
  45. Adware
  46. Flip Phone
  47. Passphrase
  48. Google
  49. SPAM
  50. Phishing
  51. AOL
  52. Worm
  53. Updates
  54. Mouse
  55. Encryption
  56. Zero-day Threat
  57. Internet of Things (IOT)
  58. Napster
  59. Portal
  60. Browser
  61. Spyware
  62. Internet Explorer
  63. CPU
  64. Atari
  65. Computer Network
  66. Lynx
  67. Cache
  68. Andriod
  69. RAM
  70. Spoofing
  71. Hacker
  72. X-Box
  73. Icon