BITCOINDIAL-UPINTERNETDATADOUBLECREATIVECOMMONSDATAFICATIONBINARYCODEY2KBUGTURINGTESTDATAMININGNETNEUTRALITYINTERNETARTVAPORWAVEPREDICTIVEANALYSISMETADATACAPTCHASHADOWBANNINGVPN(VIRTUALPRIVATENETWORK)TORRENTCLICKBAITWIKILEAKS4CHANADALOVELACECYBERSPACEDOXXINGMEMEXANALYTICALENGINEBIGDATAARPANETUBIQUITOUSCOMPUTINGHASHTAGRICKROLLINGQANONARTIMBERNERS-LEESERIOUSGAMESASMRSERVERFARMSENIACSEOELIZA(COMPUTERPROGRAM)GEOCITIESDIGITALFOOTPRINTINTERNETOFTHINGSFAKENEWSCOOKIESOCIALCREDITSYSTEMWEBCRAWLERCYBORGDEEPFAKEDARKFIBERMETAVERSEDEEPWEBQUANTUMCOMPUTINGNAPSTERALGORITHMFILTERBUBBLEMOORE'SLAWUNICODEANONYMOUSDATAVEILLANCEGPSQRCODEATTENTIONECONOMYSOUSVEILLANCENFTIPADDRESSBITCOINDIAL-UPINTERNETDATADOUBLECREATIVECOMMONSDATAFICATIONBINARYCODEY2KBUGTURINGTESTDATAMININGNETNEUTRALITYINTERNETARTVAPORWAVEPREDICTIVEANALYSISMETADATACAPTCHASHADOWBANNINGVPN(VIRTUALPRIVATENETWORK)TORRENTCLICKBAITWIKILEAKS4CHANADALOVELACECYBERSPACEDOXXINGMEMEXANALYTICALENGINEBIGDATAARPANETUBIQUITOUSCOMPUTINGHASHTAGRICKROLLINGQANONARTIMBERNERS-LEESERIOUSGAMESASMRSERVERFARMSENIACSEOELIZA(COMPUTERPROGRAM)GEOCITIESDIGITALFOOTPRINTINTERNETOFTHINGSFAKENEWSCOOKIESOCIALCREDITSYSTEMWEBCRAWLERCYBORGDEEPFAKEDARKFIBERMETAVERSEDEEPWEBQUANTUMCOMPUTINGNAPSTERALGORITHMFILTERBUBBLEMOORE'SLAWUNICODEANONYMOUSDATAVEILLANCEGPSQRCODEATTENTIONECONOMYSOUSVEILLANCENFTIPADDRESS

Computational Media BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
  1. BITCOIN
  2. DIAL-UP INTERNET
  3. DATA DOUBLE
  4. CREATIVE COMMONS
  5. DATAFICATION
  6. BINARY CODE
  7. Y2K BUG
  8. TURING TEST
  9. DATA MINING
  10. NET NEUTRALITY
  11. INTERNET ART
  12. VAPORWAVE
  13. PREDICTIVE ANALYSIS
  14. META DATA
  15. CAPTCHA
  16. SHADOW BANNING
  17. VPN (VIRTUAL PRIVATE NETWORK)
  18. TORRENT
  19. CLICKBAIT
  20. WIKI LEAKS
  21. 4CHAN
  22. ADA LOVELACE
  23. CYBERSPACE
  24. DOXXING
  25. MEMEX
  26. ANALYTICAL ENGINE
  27. BIG DATA
  28. ARPANET
  29. UBIQUITOUS COMPUTING
  30. HASHTAG
  31. RICKROLLING
  32. QANON
  33. AR
  34. TIM BERNERS-LEE
  35. SERIOUS GAMES
  36. ASMR
  37. SERVER FARMS
  38. ENIAC
  39. SEO
  40. ELIZA (COMPUTER PROGRAM)
  41. GEOCITIES
  42. DIGITAL FOOTPRINT
  43. INTERNET OF THINGS
  44. FAKE NEWS
  45. COOKIE
  46. SOCIAL CREDIT SYSTEM
  47. WEB CRAWLER
  48. CYBORG
  49. DEEP FAKE
  50. DARK FIBER
  51. METAVERSE
  52. DEEP WEB
  53. QUANTUM COMPUTING
  54. NAPSTER
  55. ALGORITHM
  56. FILTER BUBBLE
  57. MOORE'S LAW
  58. UNICODE
  59. ANONYMOUS
  60. DATAVEILLANCE
  61. GPS
  62. QR CODE
  63. ATTENTION ECONOMY
  64. SOUSVEILLANCE
  65. NFT
  66. IP ADDRESS