"I havea virusfor that"HackerwearssunglassesindoorsTeenagehackerMoney inabriefcaseHackerwears ahoodieHackersits in adark roomHackernevertouchesthe mouseGovernmentis the badguyFedoraand/orTrenchcoatFloppyDiskMeaninglessJargonGreen texton a blackbackgroundEnhance*Technomusic*OminoustelephonecallSomeone isassassinatedHackerdoesdrugsSomethingexplodesHackerchugs anenergydrinkHackerwears aleatherjacket"Bad"hackers arenon-EnglishspeakersReallyfasttypingHackerdoesn'tweardeoderantThe"firewall" is"breached"DatatheftLinuxReally terriblehacker namelike "Ph4nt0mFr34k”HackerchugscoffeeFemale Hackerhas unusual-colored hair(blue, pink,etc.)USBStickusedPale,VampiricHackerGovernmentisincompententTextprojected onsomeone'sfacePowerOutageSomeonegetsarrestedHackingto impressa guy/girlBreakingandEnteringHacker isrunningfor theirlife"Anonymous"is mentioned"I'min""I havea virusfor that"HackerwearssunglassesindoorsTeenagehackerMoney inabriefcaseHackerwears ahoodieHackersits in adark roomHackernevertouchesthe mouseGovernmentis the badguyFedoraand/orTrenchcoatFloppyDiskMeaninglessJargonGreen texton a blackbackgroundEnhance*Technomusic*OminoustelephonecallSomeone isassassinatedHackerdoesdrugsSomethingexplodesHackerchugs anenergydrinkHackerwears aleatherjacket"Bad"hackers arenon-EnglishspeakersReallyfasttypingHackerdoesn'tweardeoderantThe"firewall" is"breached"DatatheftLinuxReally terriblehacker namelike "Ph4nt0mFr34k”HackerchugscoffeeFemale Hackerhas unusual-colored hair(blue, pink,etc.)USBStickusedPale,VampiricHackerGovernmentisincompententTextprojected onsomeone'sfacePowerOutageSomeonegetsarrestedHackingto impressa guy/girlBreakingandEnteringHacker isrunningfor theirlife"Anonymous"is mentioned"I'min"

H4CK3R B1NG0 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. "I have a virus for that"
  2. Hacker wears sunglasses indoors
  3. Teenage hacker
  4. Money in a briefcase
  5. Hacker wears a hoodie
  6. Hacker sits in a dark room
  7. Hacker never touches the mouse
  8. Government is the bad guy
  9. Fedora and/or Trenchcoat
  10. Floppy Disk
  11. Meaningless Jargon
  12. Green text on a black background
  13. Enhance
  14. *Techno music*
  15. Ominous telephone call
  16. Someone is assassinated
  17. Hacker does drugs
  18. Something explodes
  19. Hacker chugs an energy drink
  20. Hacker wears a leather jacket
  21. "Bad" hackers are non-English speakers
  22. Really fast typing
  23. Hacker doesn't wear deoderant
  24. The "firewall" is "breached"
  25. Data theft
  26. Linux
  27. Really terrible hacker name like "Ph4nt0m Fr34k”
  28. Hacker chugs coffee
  29. Female Hacker has unusual-colored hair (blue, pink, etc.)
  30. USB Stick used
  31. Pale, Vampiric Hacker
  32. Government is incompentent
  33. Text projected on someone's face
  34. Power Outage
  35. Someone gets arrested
  36. Hacking to impress a guy/girl
  37. Breaking and Entering
  38. Hacker is running for their life
  39. "Anonymous" is mentioned
  40. "I'm in"