SmartWatchSPAMLaptopTheCloudGoogleSafariZero-dayThreatMouseSpoofingCPUCAPTCHABlackHatBroadbandUpdatesAdwareInternetExplorerWhiteHatGamingWebmailModemHPScarewareCachePlayStationEncryptionPortalAndriodFirewallAtariOnlineFlipPhoneWormInternetof Things(IOT)DownloadKeyloggersHacktivistIconDesktopNavigationbarBrowserHackerNapsterBandwidthARPANETComputerNetworkMacTrojanMicrosoftRAMAOLPasswordmanagerISMMicroprocessorBlackberryPasswordOfflineWorldWideWebCookiesAppleIOSNetscapeX-BoxChipsSmartPhonePortPassphraseBruteForceAttackSpywareURLMonitorPhishingRootkitsStarTACLynxSmartWatchSPAMLaptopTheCloudGoogleSafariZero-dayThreatMouseSpoofingCPUCAPTCHABlackHatBroadbandUpdatesAdwareInternetExplorerWhiteHatGamingWebmailModemHPScarewareCachePlayStationEncryptionPortalAndriodFirewallAtariOnlineFlipPhoneWormInternetof Things(IOT)DownloadKeyloggersHacktivistIconDesktopNavigationbarBrowserHackerNapsterBandwidthARPANETComputerNetworkMacTrojanMicrosoftRAMAOLPasswordmanagerISMMicroprocessorBlackberryPasswordOfflineWorldWideWebCookiesAppleIOSNetscapeX-BoxChipsSmartPhonePortPassphraseBruteForceAttackSpywareURLMonitorPhishingRootkitsStarTACLynx

Tech Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
  1. Smart Watch
  2. SPAM
  3. Laptop
  4. The Cloud
  5. Google
  6. Safari
  7. Zero-day Threat
  8. Mouse
  9. Spoofing
  10. CPU
  11. CAPTCHA
  12. Black Hat
  13. Broadband
  14. Updates
  15. Adware
  16. Internet Explorer
  17. White Hat
  18. Gaming
  19. Webmail
  20. Modem
  21. HP
  22. Scareware
  23. Cache
  24. PlayStation
  25. Encryption
  26. Portal
  27. Andriod
  28. Firewall
  29. Atari
  30. Online
  31. Flip Phone
  32. Worm
  33. Internet of Things (IOT)
  34. Download
  35. Keyloggers
  36. Hacktivist
  37. Icon
  38. Desktop
  39. Navigation bar
  40. Browser
  41. Hacker
  42. Napster
  43. Bandwidth
  44. ARPANET
  45. Computer Network
  46. Mac
  47. Trojan
  48. Microsoft
  49. RAM
  50. AOL
  51. Password manager
  52. ISM
  53. Microprocessor
  54. Blackberry
  55. Password
  56. Offline
  57. World Wide Web
  58. Cookies
  59. Apple IOS
  60. Netscape
  61. X-Box
  62. Chips
  63. Smart Phone
  64. Port
  65. Passphrase
  66. Brute Force Attack
  67. Spyware
  68. URL
  69. Monitor
  70. Phishing
  71. Rootkits
  72. StarTAC
  73. Lynx