EnhanceSomeonegetsarrested"Bad"hackers arenon-EnglishspeakersTextprojected onsomeone'sfacePowerOutageGovernmentisincompententLinuxHackerdoesdrugsHackerwears aleatherjacket*Technomusic*BreakingandEnteringMoney inabriefcase"Anonymous"is mentionedHackingto impressa guy/girlGreen texton a blackbackgroundUSBStickusedSomethingexplodesGovernmentis the badguyHackerdoesn'tweardeoderantHackersits in adark roomFemale Hackerhas unusual-colored hair(blue, pink,etc.)Fedoraand/orTrenchcoatHackerwears ahoodieHackerwearssunglassesindoorsHackernevertouchesthe mouse"I'min"MeaninglessJargonReallyfasttypingThe"firewall" is"breached"Hackerchugs anenergydrinkPale,VampiricHackerHackerchugscoffee"I havea virusfor that"OminoustelephonecallReally terriblehacker namelike "Ph4nt0mFr34k”DatatheftHacker isrunningfor theirlifeFloppyDiskTeenagehackerSomeone isassassinatedEnhanceSomeonegetsarrested"Bad"hackers arenon-EnglishspeakersTextprojected onsomeone'sfacePowerOutageGovernmentisincompententLinuxHackerdoesdrugsHackerwears aleatherjacket*Technomusic*BreakingandEnteringMoney inabriefcase"Anonymous"is mentionedHackingto impressa guy/girlGreen texton a blackbackgroundUSBStickusedSomethingexplodesGovernmentis the badguyHackerdoesn'tweardeoderantHackersits in adark roomFemale Hackerhas unusual-colored hair(blue, pink,etc.)Fedoraand/orTrenchcoatHackerwears ahoodieHackerwearssunglassesindoorsHackernevertouchesthe mouse"I'min"MeaninglessJargonReallyfasttypingThe"firewall" is"breached"Hackerchugs anenergydrinkPale,VampiricHackerHackerchugscoffee"I havea virusfor that"OminoustelephonecallReally terriblehacker namelike "Ph4nt0mFr34k”DatatheftHacker isrunningfor theirlifeFloppyDiskTeenagehackerSomeone isassassinated

H4CK3R B1NG0 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Enhance
  2. Someone gets arrested
  3. "Bad" hackers are non-English speakers
  4. Text projected on someone's face
  5. Power Outage
  6. Government is incompentent
  7. Linux
  8. Hacker does drugs
  9. Hacker wears a leather jacket
  10. *Techno music*
  11. Breaking and Entering
  12. Money in a briefcase
  13. "Anonymous" is mentioned
  14. Hacking to impress a guy/girl
  15. Green text on a black background
  16. USB Stick used
  17. Something explodes
  18. Government is the bad guy
  19. Hacker doesn't wear deoderant
  20. Hacker sits in a dark room
  21. Female Hacker has unusual-colored hair (blue, pink, etc.)
  22. Fedora and/or Trenchcoat
  23. Hacker wears a hoodie
  24. Hacker wears sunglasses indoors
  25. Hacker never touches the mouse
  26. "I'm in"
  27. Meaningless Jargon
  28. Really fast typing
  29. The "firewall" is "breached"
  30. Hacker chugs an energy drink
  31. Pale, Vampiric Hacker
  32. Hacker chugs coffee
  33. "I have a virus for that"
  34. Ominous telephone call
  35. Really terrible hacker name like "Ph4nt0m Fr34k”
  36. Data theft
  37. Hacker is running for their life
  38. Floppy Disk
  39. Teenage hacker
  40. Someone is assassinated