Linux"I havea virusfor that"OminoustelephonecallMeaninglessJargonReallyfasttypingMoney inabriefcaseEnhanceUSBStickused"Bad"hackers arenon-EnglishspeakersHackerwears aleatherjacketTextprojected onsomeone'sfaceSomethingexplodesFloppyDiskGovernmentis the badguyHackerdoesdrugsHackerwearssunglassesindoors"Anonymous"is mentionedGovernmentisincompententTeenagehackerPale,VampiricHackerBreakingandEnteringSomeonegetsarrestedReally terriblehacker namelike "Ph4nt0mFr34k”Hackingto impressa guy/girlThe"firewall" is"breached"DatatheftHackersits in adark roomHackerdoesn'tweardeoderant"I'min"Hackerchugs anenergydrinkHacker isrunningfor theirlifeGreen texton a blackbackgroundFedoraand/orTrenchcoatHackerwears ahoodieHackerchugscoffee*Technomusic*Female Hackerhas unusual-colored hair(blue, pink,etc.)Someone isassassinatedHackernevertouchesthe mousePowerOutageLinux"I havea virusfor that"OminoustelephonecallMeaninglessJargonReallyfasttypingMoney inabriefcaseEnhanceUSBStickused"Bad"hackers arenon-EnglishspeakersHackerwears aleatherjacketTextprojected onsomeone'sfaceSomethingexplodesFloppyDiskGovernmentis the badguyHackerdoesdrugsHackerwearssunglassesindoors"Anonymous"is mentionedGovernmentisincompententTeenagehackerPale,VampiricHackerBreakingandEnteringSomeonegetsarrestedReally terriblehacker namelike "Ph4nt0mFr34k”Hackingto impressa guy/girlThe"firewall" is"breached"DatatheftHackersits in adark roomHackerdoesn'tweardeoderant"I'min"Hackerchugs anenergydrinkHacker isrunningfor theirlifeGreen texton a blackbackgroundFedoraand/orTrenchcoatHackerwears ahoodieHackerchugscoffee*Technomusic*Female Hackerhas unusual-colored hair(blue, pink,etc.)Someone isassassinatedHackernevertouchesthe mousePowerOutage

H4CK3R B1NG0 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Linux
  2. "I have a virus for that"
  3. Ominous telephone call
  4. Meaningless Jargon
  5. Really fast typing
  6. Money in a briefcase
  7. Enhance
  8. USB Stick used
  9. "Bad" hackers are non-English speakers
  10. Hacker wears a leather jacket
  11. Text projected on someone's face
  12. Something explodes
  13. Floppy Disk
  14. Government is the bad guy
  15. Hacker does drugs
  16. Hacker wears sunglasses indoors
  17. "Anonymous" is mentioned
  18. Government is incompentent
  19. Teenage hacker
  20. Pale, Vampiric Hacker
  21. Breaking and Entering
  22. Someone gets arrested
  23. Really terrible hacker name like "Ph4nt0m Fr34k”
  24. Hacking to impress a guy/girl
  25. The "firewall" is "breached"
  26. Data theft
  27. Hacker sits in a dark room
  28. Hacker doesn't wear deoderant
  29. "I'm in"
  30. Hacker chugs an energy drink
  31. Hacker is running for their life
  32. Green text on a black background
  33. Fedora and/or Trenchcoat
  34. Hacker wears a hoodie
  35. Hacker chugs coffee
  36. *Techno music*
  37. Female Hacker has unusual-colored hair (blue, pink, etc.)
  38. Someone is assassinated
  39. Hacker never touches the mouse
  40. Power Outage