DIAL-UPINTERNETTIMBERNERS-LEEELIZA(COMPUTERPROGRAM)DOXXINGQRCODESOCIALCREDITSYSTEMDATADOUBLESHADOWBANNINGIPADDRESSCLICKBAITASMRVPN(VIRTUALPRIVATENETWORK)ADALOVELACENFTWIKILEAKSVAPORWAVEMETADATARICKROLLINGPREDICTIVEANALYSISY2KBUGANONYMOUSHASHTAGFILTERBUBBLEDARKFIBERGPSBINARYCODECOOKIEMOORE'SLAWENIACDEEPWEBDATAFICATIONSERIOUSGAMESANALYTICALENGINEALGORITHMDEEPFAKENETNEUTRALITYBIGDATAATTENTIONECONOMYUNICODEARCREATIVECOMMONSMETAVERSETORRENTBITCOINUBIQUITOUSCOMPUTINGFAKENEWSTURINGTESTSOUSVEILLANCEINTERNETARTNAPSTERSEOCAPTCHA4CHANQUANTUMCOMPUTINGWEBCRAWLERQANONGEOCITIESDATAVEILLANCEMEMEXCYBERSPACEINTERNETOFTHINGSCYBORGARPANETDATAMININGSERVERFARMSDIGITALFOOTPRINTDIAL-UPINTERNETTIMBERNERS-LEEELIZA(COMPUTERPROGRAM)DOXXINGQRCODESOCIALCREDITSYSTEMDATADOUBLESHADOWBANNINGIPADDRESSCLICKBAITASMRVPN(VIRTUALPRIVATENETWORK)ADALOVELACENFTWIKILEAKSVAPORWAVEMETADATARICKROLLINGPREDICTIVEANALYSISY2KBUGANONYMOUSHASHTAGFILTERBUBBLEDARKFIBERGPSBINARYCODECOOKIEMOORE'SLAWENIACDEEPWEBDATAFICATIONSERIOUSGAMESANALYTICALENGINEALGORITHMDEEPFAKENETNEUTRALITYBIGDATAATTENTIONECONOMYUNICODEARCREATIVECOMMONSMETAVERSETORRENTBITCOINUBIQUITOUSCOMPUTINGFAKENEWSTURINGTESTSOUSVEILLANCEINTERNETARTNAPSTERSEOCAPTCHA4CHANQUANTUMCOMPUTINGWEBCRAWLERQANONGEOCITIESDATAVEILLANCEMEMEXCYBERSPACEINTERNETOFTHINGSCYBORGARPANETDATAMININGSERVERFARMSDIGITALFOOTPRINT

Computational Media BINGO! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
  1. DIAL-UP INTERNET
  2. TIM BERNERS-LEE
  3. ELIZA (COMPUTER PROGRAM)
  4. DOXXING
  5. QR CODE
  6. SOCIAL CREDIT SYSTEM
  7. DATA DOUBLE
  8. SHADOW BANNING
  9. IP ADDRESS
  10. CLICKBAIT
  11. ASMR
  12. VPN (VIRTUAL PRIVATE NETWORK)
  13. ADA LOVELACE
  14. NFT
  15. WIKI LEAKS
  16. VAPORWAVE
  17. META DATA
  18. RICKROLLING
  19. PREDICTIVE ANALYSIS
  20. Y2K BUG
  21. ANONYMOUS
  22. HASHTAG
  23. FILTER BUBBLE
  24. DARK FIBER
  25. GPS
  26. BINARY CODE
  27. COOKIE
  28. MOORE'S LAW
  29. ENIAC
  30. DEEP WEB
  31. DATAFICATION
  32. SERIOUS GAMES
  33. ANALYTICAL ENGINE
  34. ALGORITHM
  35. DEEP FAKE
  36. NET NEUTRALITY
  37. BIG DATA
  38. ATTENTION ECONOMY
  39. UNICODE
  40. AR
  41. CREATIVE COMMONS
  42. METAVERSE
  43. TORRENT
  44. BITCOIN
  45. UBIQUITOUS COMPUTING
  46. FAKE NEWS
  47. TURING TEST
  48. SOUSVEILLANCE
  49. INTERNET ART
  50. NAPSTER
  51. SEO
  52. CAPTCHA
  53. 4CHAN
  54. QUANTUM COMPUTING
  55. WEB CRAWLER
  56. QANON
  57. GEOCITIES
  58. DATAVEILLANCE
  59. MEMEX
  60. CYBERSPACE
  61. INTERNET OF THINGS
  62. CYBORG
  63. ARPANET
  64. DATA MINING
  65. SERVER FARMS
  66. DIGITAL FOOTPRINT