Smart Watch SPAM Laptop The Cloud Google Safari Zero- day Threat Mouse Spoofing CPU CAPTCHA Black Hat Broadband Updates Adware Internet Explorer White Hat Gaming Webmail Modem HP Scareware Cache PlayStation Encryption Portal Andriod Firewall Atari Online Flip Phone Worm Internet of Things (IOT) Download Keyloggers Hacktivist Icon Desktop Navigation bar Browser Hacker Napster Bandwidth ARPANET Computer Network Mac Trojan Microsoft RAM AOL Password manager ISM Microprocessor Blackberry Password Offline World Wide Web Cookies Apple IOS Netscape X- Box Chips Smart Phone Port Passphrase Brute Force Attack Spyware URL Monitor Phishing Rootkits StarTAC Lynx Smart Watch SPAM Laptop The Cloud Google Safari Zero- day Threat Mouse Spoofing CPU CAPTCHA Black Hat Broadband Updates Adware Internet Explorer White Hat Gaming Webmail Modem HP Scareware Cache PlayStation Encryption Portal Andriod Firewall Atari Online Flip Phone Worm Internet of Things (IOT) Download Keyloggers Hacktivist Icon Desktop Navigation bar Browser Hacker Napster Bandwidth ARPANET Computer Network Mac Trojan Microsoft RAM AOL Password manager ISM Microprocessor Blackberry Password Offline World Wide Web Cookies Apple IOS Netscape X- Box Chips Smart Phone Port Passphrase Brute Force Attack Spyware URL Monitor Phishing Rootkits StarTAC Lynx
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Smart Watch
SPAM
Laptop
The Cloud
Google
Safari
Zero-day Threat
Mouse
Spoofing
CPU
CAPTCHA
Black Hat
Broadband
Updates
Adware
Internet Explorer
White Hat
Gaming
Webmail
Modem
HP
Scareware
Cache
PlayStation
Encryption
Portal
Andriod
Firewall
Atari
Online
Flip Phone
Worm
Internet of Things (IOT)
Download
Keyloggers
Hacktivist
Icon
Desktop
Navigation bar
Browser
Hacker
Napster
Bandwidth
ARPANET
Computer Network
Mac
Trojan
Microsoft
RAM
AOL
Password manager
ISM
Microprocessor
Blackberry
Password
Offline
World Wide Web
Cookies
Apple IOS
Netscape
X-Box
Chips
Smart Phone
Port
Passphrase
Brute Force Attack
Spyware
URL
Monitor
Phishing
Rootkits
StarTAC
Lynx