Night light CPU Standard User Ransomware 35 .jpg Firewall 30 Trojan Horse Phishing Program Files OneDrive Hard Drive Microsoft Account .pptx High Contrast .mp4 Azure 2FA PIN .mp3 Hyper V Program Files (x86) Incremental Mirror Differential McDonald's WiFi Smart Card Update Install Adware Teams Write Color Filters Custom Install Orientation Modify Driver UAC Windows Defender Hard Drive DisplayPort VGA HDMI Worm Spyware C:\Windows Administrator Local Account Fingerprint Scanner System GUI Virus .docx .xlsx Vishing Full Control Memory Night light CPU Standard User Ransomware 35 .jpg Firewall 30 Trojan Horse Phishing Program Files OneDrive Hard Drive Microsoft Account .pptx High Contrast .mp4 Azure 2FA PIN .mp3 Hyper V Program Files (x86) Incremental Mirror Differential McDonald's WiFi Smart Card Update Install Adware Teams Write Color Filters Custom Install Orientation Modify Driver UAC Windows Defender Hard Drive DisplayPort VGA HDMI Worm Spyware C:\Windows Administrator Local Account Fingerprint Scanner System GUI Virus .docx .xlsx Vishing Full Control Memory
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Night light
CPU
Standard User
Ransomware
35
.jpg
Firewall
30
Trojan Horse
Phishing
Program Files
OneDrive
Hard Drive
Microsoft Account
.pptx
High Contrast
.mp4
Azure
2FA
PIN
.mp3
Hyper V
Program Files (x86)
Incremental
Mirror
Differential
McDonald's WiFi
Smart Card
Update Install
Adware
Teams
Write
Color Filters
Custom Install
Orientation
Modify
Driver
UAC
Windows Defender
Hard Drive
DisplayPort
VGA
HDMI
Worm
Spyware
C:\Windows
Administrator
Local Account
Fingerprint Scanner
System
GUI
Virus
.docx
.xlsx
Vishing
Full Control
Memory