WorldWideWebPasswordKeyloggersModemUpdatesLynxSpywareHPNapsterURLEncryptionTheCloudScarewareDesktopBroadbandCacheInternetof Things(IOT)WebmailX-BoxPortChipsWormMicroprocessorGoogleAndriodOnlineIconRAMMicrosoftMouseSmartPhoneZero-dayThreatLaptopAppleIOSSmartWatchCAPTCHADownloadRootkitsCPUWhiteHatFlipPhoneInternetExplorerOfflineTrojanBlackberryPassphrasePortalAtariHacktivistSPAMBlackHatSpoofingNavigationbarFirewallPhishingAOLPlayStationARPANETBrowserMacNetscapeGamingMonitorPasswordmanagerCookiesISMAdwareBruteForceAttackSafariHackerBandwidthStarTACComputerNetworkWorldWideWebPasswordKeyloggersModemUpdatesLynxSpywareHPNapsterURLEncryptionTheCloudScarewareDesktopBroadbandCacheInternetof Things(IOT)WebmailX-BoxPortChipsWormMicroprocessorGoogleAndriodOnlineIconRAMMicrosoftMouseSmartPhoneZero-dayThreatLaptopAppleIOSSmartWatchCAPTCHADownloadRootkitsCPUWhiteHatFlipPhoneInternetExplorerOfflineTrojanBlackberryPassphrasePortalAtariHacktivistSPAMBlackHatSpoofingNavigationbarFirewallPhishingAOLPlayStationARPANETBrowserMacNetscapeGamingMonitorPasswordmanagerCookiesISMAdwareBruteForceAttackSafariHackerBandwidthStarTACComputerNetwork

Tech Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
  1. World Wide Web
  2. Password
  3. Keyloggers
  4. Modem
  5. Updates
  6. Lynx
  7. Spyware
  8. HP
  9. Napster
  10. URL
  11. Encryption
  12. The Cloud
  13. Scareware
  14. Desktop
  15. Broadband
  16. Cache
  17. Internet of Things (IOT)
  18. Webmail
  19. X-Box
  20. Port
  21. Chips
  22. Worm
  23. Microprocessor
  24. Google
  25. Andriod
  26. Online
  27. Icon
  28. RAM
  29. Microsoft
  30. Mouse
  31. Smart Phone
  32. Zero-day Threat
  33. Laptop
  34. Apple IOS
  35. Smart Watch
  36. CAPTCHA
  37. Download
  38. Rootkits
  39. CPU
  40. White Hat
  41. Flip Phone
  42. Internet Explorer
  43. Offline
  44. Trojan
  45. Blackberry
  46. Passphrase
  47. Portal
  48. Atari
  49. Hacktivist
  50. SPAM
  51. Black Hat
  52. Spoofing
  53. Navigation bar
  54. Firewall
  55. Phishing
  56. AOL
  57. PlayStation
  58. ARPANET
  59. Browser
  60. Mac
  61. Netscape
  62. Gaming
  63. Monitor
  64. Password manager
  65. Cookies
  66. ISM
  67. Adware
  68. Brute Force Attack
  69. Safari
  70. Hacker
  71. Bandwidth
  72. StarTAC
  73. Computer Network