CPU.Central processing unit.Often referred to as thebrain of the computer, theCPU in essence is a veryfast calculator thatprocesses all theinstructions that control thedata flow inside thecomputer. The CPUconsists of two parts, thecontrolCOUNTA.A function in MicrosoftExcel and otherspreadsheetapplications. TheCOUNTA functioncounts the number ofcells in a specific rangethat contains a numberand or Tex.CSV.(comma- separatedvalues). Tabular data aresaved in a plain text formatwith each fields dataseparated by a comma. ACSV file is used whenexporting data from onedatabase system andimporting it into another.ClickbaitTerm given to an onlinelink in the form of animage, highly-styledtext, or video thumbnailto encourage the userto click on it. The text isusually very evocativeand the image of ashocking nature.Criteria.When you create a queryusing Microsoft Access, thecriteria allow you to filteryour request to include orexclude specificinformation relating to afield. For example, a gymcould run a querydisplaying all the membersof the gym but set criteCookie.A small text file saved ontoyour computer by awebsite. The websitestores informationregarding your visit to thesite, such as which pagesyou have seen, what itemsyou may have put into ashopping cart the previoustime you were there, orwhCOUNTIFA function in MicrosoftExcel and otherspreadsheetapplications. TheCOUNTIF functioncounts the number ofcells in a specifiedrange that meet agiven criteria only.COUNT.A function in MicrosoftExcel and otherspreadsheetapplications. TheCOUNT functioncounts the number ofcells in a specific rangethat contain only anumber.Copy.Duplicating an objector selected text to theclipboard in order topaste it elsewhere,be it in a folder or in adocument. Shortcutkey for this is Control+ C.Clipboard.The clipboard is atemporary storagearea in the computer'smemory for holdinginformation that hasbeen cut or copied.That information canthen be pastedelsewhere.CMOS.Complementary metaloxide semiconductor. Achip on the motherboardpowered by a small batterywhich stores the basicinput, output systems, biosettings such as date, timeand certain hardwaresettings.Cracking.A methodology employedor an application createdto bypass the security ofa computer system or toedit the source code of asoftware application toremove restrictions suchas registration or productkey entry.Copyright.An intellectual property lawthat protects someone'soriginal work. By usingsomeone else's workwithout consent, or bycopying someone else'swork and claiming it asyour own, you areinfringing upon thecopyright of that person.random accessmemory andexecutes them, andthe arithmetic logicunit performs themathematics andlogical functions.Cross-platform.When an applicationis designed to run onmore than oneoperating system, itis then deemedacross platformapplication.Column.Vertical range of dataconsisting of cells either ina table or a spreadsheet. Ina spreadsheet, a column isindicated by a letter in thetop row. Columns in Wordprocessing andspreadsheet documentsmight also contain columnheaders which allowCSS.(Cascading Style Sheets)Code, often contained in atext file with a CSSextension that specifieshow Hypertext MarkupLanguage (HTML)elements, ID's, fonts andattributes should beformatted. CSS allows auser to separate the HTMLtextual conteCTA.Call to action. A marketingterm used extensively insales and advertising. Animage or button on a webpage designed to grabattention and entice usersto click on the image orbutton. The image or buttoncould be another page onthe site with iCybersecurity.Process and technologiesthat have been created toprotect computers andnetworks from illegal onlineaccess. Online attacks willalways try and find entrypoints into systems. It isthe responsibility ofcybersecurity systems toensure that no eCMS.Content Managementsystem. An onlineapplication that allows auser to create and maintaincontent in various forms.Those forms could be apersonal block, corporateblock, or fully fledgedwebsite, or even a privateIntranet. The applicationruCMYK.Cyan, magenta, yellow andkey black. For printers thatuse coloured ink, these 4colours are used inseparate cartridges. Bymixing the colours invarying quantities, variouscolours can be produced.Convergence.A term to explain thecombining of manytechnologies into a singledevice. Where devicespreviously used to besingle purpose, they arenow capable of executingmany different taskspreviously done bynumerous single purposedevices.COUNTBLANK.A function in MicrosoftExcel and otherspreadsheetapplications. TheCOUNTBLANKfunction counts thenumber of cells in aspecified range thatare empty.Currency.A formatting option inMicrosoft Excel andother spreadsheetapplications. The data ina cell or range of cellscan be formatted to bedisplayed as monetarydata, provided the dataconsists of numbers only.Comments. In an application such asMicrosoft Word, in theReview section in theribbon, the Commentsoption allows a user toleave comments indocuments, to suggestediting changes, or merelyto comment on somethingregarding the content.Concatenate.A function inMicrosoft Excel andother spreadsheetapplications thatcombine or join twoor more strings intoone string.CrowdfundingA method of raising moneyto go towards a businessventure, not-for-profitactivity or social course.The money is raised bycommunicating via Internetand social media platforms.People contribute fundsinto an account without anyguarantee or rCryptocurrency.A digital currency that ispurchased, transferred,and sold usingcryptography. The data thatis part of the transaction isencrypted and verified by anetwork of computers thathave no relation to eachother or any particularentity. This meanscutRemoving an object orselected text from itsoriginal location andplacing it onto theclipboard in order topaste it elsewhere, beit in a folder or in adocument. Or to deleteit if paste is not used.Compression.Using very efficientalgorithms, compressionsoftware is able to take adigital file and squash orcompress it in order tomake the file size evensmaller. Compressionsoftware is also able totake multiple files andcompress them into onefile.Cybercrime.Criminal activitiesthat involve theuse of computertechnology andthe Internet. Thiscan includeClient.A computer that connectsto a network and accessesa main server is called aclient. A client machine isnormally a workstation thataccesses the resourcesbeing made available viathe server and the networkinfrastructure.CPU.Central processing unit.Often referred to as thebrain of the computer, theCPU in essence is a veryfast calculator thatprocesses all theinstructions that control thedata flow inside thecomputer. The CPUconsists of two parts, thecontrolCOUNTA.A function in MicrosoftExcel and otherspreadsheetapplications. TheCOUNTA functioncounts the number ofcells in a specific rangethat contains a numberand or Tex.CSV.(comma- separatedvalues). Tabular data aresaved in a plain text formatwith each fields dataseparated by a comma. ACSV file is used whenexporting data from onedatabase system andimporting it into another.ClickbaitTerm given to an onlinelink in the form of animage, highly-styledtext, or video thumbnailto encourage the userto click on it. The text isusually very evocativeand the image of ashocking nature.Criteria.When you create a queryusing Microsoft Access, thecriteria allow you to filteryour request to include orexclude specificinformation relating to afield. For example, a gymcould run a querydisplaying all the membersof the gym but set criteCookie.A small text file saved ontoyour computer by awebsite. The websitestores informationregarding your visit to thesite, such as which pagesyou have seen, what itemsyou may have put into ashopping cart the previoustime you were there, orwhCOUNTIFA function in MicrosoftExcel and otherspreadsheetapplications. TheCOUNTIF functioncounts the number ofcells in a specifiedrange that meet agiven criteria only.COUNT.A function in MicrosoftExcel and otherspreadsheetapplications. TheCOUNT functioncounts the number ofcells in a specific rangethat contain only anumber.Copy.Duplicating an objector selected text to theclipboard in order topaste it elsewhere,be it in a folder or in adocument. Shortcutkey for this is Control+ C.Clipboard.The clipboard is atemporary storagearea in the computer'smemory for holdinginformation that hasbeen cut or copied.That information canthen be pastedelsewhere.CMOS.Complementary metaloxide semiconductor. Achip on the motherboardpowered by a small batterywhich stores the basicinput, output systems, biosettings such as date, timeand certain hardwaresettings.Cracking.A methodology employedor an application createdto bypass the security ofa computer system or toedit the source code of asoftware application toremove restrictions suchas registration or productkey entry.Copyright.An intellectual property lawthat protects someone'soriginal work. By usingsomeone else's workwithout consent, or bycopying someone else'swork and claiming it asyour own, you areinfringing upon thecopyright of that person.random accessmemory andexecutes them, andthe arithmetic logicunit performs themathematics andlogical functions.Cross-platform.When an applicationis designed to run onmore than oneoperating system, itis then deemedacross platformapplication.Column.Vertical range of dataconsisting of cells either ina table or a spreadsheet. Ina spreadsheet, a column isindicated by a letter in thetop row. Columns in Wordprocessing andspreadsheet documentsmight also contain columnheaders which allowCSS.(Cascading Style Sheets)Code, often contained in atext file with a CSSextension that specifieshow Hypertext MarkupLanguage (HTML)elements, ID's, fonts andattributes should beformatted. CSS allows auser to separate the HTMLtextual conteCTA.Call to action. A marketingterm used extensively insales and advertising. Animage or button on a webpage designed to grabattention and entice usersto click on the image orbutton. The image or buttoncould be another page onthe site with iCybersecurity.Process and technologiesthat have been created toprotect computers andnetworks from illegal onlineaccess. Online attacks willalways try and find entrypoints into systems. It isthe responsibility ofcybersecurity systems toensure that no eCMS.Content Managementsystem. An onlineapplication that allows auser to create and maintaincontent in various forms.Those forms could be apersonal block, corporateblock, or fully fledgedwebsite, or even a privateIntranet. The applicationruCMYK.Cyan, magenta, yellow andkey black. For printers thatuse coloured ink, these 4colours are used inseparate cartridges. Bymixing the colours invarying quantities, variouscolours can be produced.Convergence.A term to explain thecombining of manytechnologies into a singledevice. Where devicespreviously used to besingle purpose, they arenow capable of executingmany different taskspreviously done bynumerous single purposedevices.COUNTBLANK.A function in MicrosoftExcel and otherspreadsheetapplications. TheCOUNTBLANKfunction counts thenumber of cells in aspecified range thatare empty.Currency.A formatting option inMicrosoft Excel andother spreadsheetapplications. The data ina cell or range of cellscan be formatted to bedisplayed as monetarydata, provided the dataconsists of numbers only.Comments. In an application such asMicrosoft Word, in theReview section in theribbon, the Commentsoption allows a user toleave comments indocuments, to suggestediting changes, or merelyto comment on somethingregarding the content.Concatenate.A function inMicrosoft Excel andother spreadsheetapplications thatcombine or join twoor more strings intoone string.CrowdfundingA method of raising moneyto go towards a businessventure, not-for-profitactivity or social course.The money is raised bycommunicating via Internetand social media platforms.People contribute fundsinto an account without anyguarantee or rCryptocurrency.A digital currency that ispurchased, transferred,and sold usingcryptography. The data thatis part of the transaction isencrypted and verified by anetwork of computers thathave no relation to eachother or any particularentity. This meanscutRemoving an object orselected text from itsoriginal location andplacing it onto theclipboard in order topaste it elsewhere, beit in a folder or in adocument. Or to deleteit if paste is not used.Compression.Using very efficientalgorithms, compressionsoftware is able to take adigital file and squash orcompress it in order tomake the file size evensmaller. Compressionsoftware is also able totake multiple files andcompress them into onefile.Cybercrime.Criminal activitiesthat involve theuse of computertechnology andthe Internet. Thiscan includeClient.A computer that connectsto a network and accessesa main server is called aclient. A client machine isnormally a workstation thataccesses the resourcesbeing made available viathe server and the networkinfrastructure.

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
  1. Central processing unit. Often referred to as the brain of the computer, the CPU in essence is a very fast calculator that processes all the instructions that control the data flow inside the computer. The CPU consists of two parts, the control
    CPU.
  2. A function in Microsoft Excel and other spreadsheet applications. The COUNTA function counts the number of cells in a specific range that contains a number and or Tex.
    COUNTA.
  3. (comma- separated values). Tabular data are saved in a plain text format with each fields data separated by a comma. A CSV file is used when exporting data from one database system and importing it into another.
    CSV.
  4. Term given to an online link in the form of an image, highly-styled text, or video thumbnail to encourage the user to click on it. The text is usually very evocative and the image of a shocking nature.
    Clickbait
  5. When you create a query using Microsoft Access, the criteria allow you to filter your request to include or exclude specific information relating to a field. For example, a gym could run a query displaying all the members of the gym but set crite
    Criteria.
  6. A small text file saved onto your computer by a website. The website stores information regarding your visit to the site, such as which pages you have seen, what items you may have put into a shopping cart the previous time you were there, or wh
    Cookie.
  7. A function in Microsoft Excel and other spreadsheet applications. The COUNTIF function counts the number of cells in a specified range that meet a given criteria only.
    COUNTIF
  8. A function in Microsoft Excel and other spreadsheet applications. The COUNT function counts the number of cells in a specific range that contain only a number.
    COUNT.
  9. Duplicating an object or selected text to the clipboard in order to paste it elsewhere, be it in a folder or in a document. Shortcut key for this is Control + C.
    Copy.
  10. The clipboard is a temporary storage area in the computer's memory for holding information that has been cut or copied. That information can then be pasted elsewhere.
    Clipboard.
  11. Complementary metal oxide semiconductor. A chip on the motherboard powered by a small battery which stores the basic input, output systems, bio settings such as date, time and certain hardware settings.
    CMOS.
  12. A methodology employed or an application created to bypass the security of a computer system or to edit the source code of a software application to remove restrictions such as registration or product key entry.
    Cracking.
  13. An intellectual property law that protects someone's original work. By using someone else's work without consent, or by copying someone else's work and claiming it as your own, you are infringing upon the copyright of that person.
    Copyright.
  14. random access memory and executes them, and the arithmetic logic unit performs the mathematics and logical functions.
  15. When an application is designed to run on more than one operating system, it is then deemed across platform application.
    Cross-platform.
  16. Vertical range of data consisting of cells either in a table or a spreadsheet. In a spreadsheet, a column is indicated by a letter in the top row. Columns in Word processing and spreadsheet documents might also contain column headers which allow
    Column.
  17. (Cascading Style Sheets) Code, often contained in a text file with a CSS extension that specifies how Hypertext Markup Language (HTML) elements, ID's, fonts and attributes should be formatted. CSS allows a user to separate the HTML textual conte
    CSS.
  18. Call to action. A marketing term used extensively in sales and advertising. An image or button on a web page designed to grab attention and entice users to click on the image or button. The image or button could be another page on the site with i
    CTA.
  19. Process and technologies that have been created to protect computers and networks from illegal online access. Online attacks will always try and find entry points into systems. It is the responsibility of cybersecurity systems to ensure that no e
    Cybersecurity.
  20. Content Management system. An online application that allows a user to create and maintain content in various forms. Those forms could be a personal block, corporate block, or fully fledged website, or even a private Intranet. The application ru
    CMS.
  21. Cyan, magenta, yellow and key black. For printers that use coloured ink, these 4 colours are used in separate cartridges. By mixing the colours in varying quantities, various colours can be produced.
    CMYK.
  22. A term to explain the combining of many technologies into a single device. Where devices previously used to be single purpose, they are now capable of executing many different tasks previously done by numerous single purpose devices.
    Convergence.
  23. A function in Microsoft Excel and other spreadsheet applications. The COUNTBLANK function counts the number of cells in a specified range that are empty.
    COUNTBLANK.
  24. A formatting option in Microsoft Excel and other spreadsheet applications. The data in a cell or range of cells can be formatted to be displayed as monetary data, provided the data consists of numbers only.
    Currency.
  25. . In an application such as Microsoft Word, in the Review section in the ribbon, the Comments option allows a user to leave comments in documents, to suggest editing changes, or merely to comment on something regarding the content.
    Comments
  26. A function in Microsoft Excel and other spreadsheet applications that combine or join two or more strings into one string.
    Concatenate.
  27. A method of raising money to go towards a business venture, not-for-profit activity or social course. The money is raised by communicating via Internet and social media platforms. People contribute funds into an account without any guarantee or r
    Crowdfunding
  28. A digital currency that is purchased, transferred, and sold using cryptography. The data that is part of the transaction is encrypted and verified by a network of computers that have no relation to each other or any particular entity. This means
    Cryptocurrency.
  29. Removing an object or selected text from its original location and placing it onto the clipboard in order to paste it elsewhere, be it in a folder or in a document. Or to delete it if paste is not used.
    cut
  30. Using very efficient algorithms, compression software is able to take a digital file and squash or compress it in order to make the file size even smaller. Compression software is also able to take multiple files and compress them into one file.
    Compression.
  31. Criminal activities that involve the use of computer technology and the Internet. This can include
    Cybercrime.
  32. A computer that connects to a network and accesses a main server is called a client. A client machine is normally a workstation that accesses the resources being made available via the server and the network infrastructure.
    Client.