Plans to attend 4- year after graduation Working alongside coursework Addicted to Energy Drinks/Coffee Loves Math Plays a musical instrument Software Development Major Has or Has Had an Internship/Coop Configured personal home network Has given a presentation Has a pet Birthday in April Database Development Major Traveled internationally Knows one bad tech joke Seen a movie in theatre multiple times Helped family with basic tech setup Has been in a club before Uses a VPN Can name AAA security acronym Has gotten a virus before Has worked in a tech position Likes to cook Has played regular bingo before Configured a Raspberry Pi Prefers Light mode Built my own computer Has used Metasploit to run an exploit Athletic Afraid of rollercoasters Has Installed Linux before Completed a full coding project Uses a Password Manager Has jailbroken a device Interested in Leadership Fallen for a phishing email Have gotten my first certification Still has weak passwords Uses an old, embarrassing email address Has read a cybersecurity book Plans to attend 4- year after graduation Working alongside coursework Addicted to Energy Drinks/Coffee Loves Math Plays a musical instrument Software Development Major Has or Has Had an Internship/Coop Configured personal home network Has given a presentation Has a pet Birthday in April Database Development Major Traveled internationally Knows one bad tech joke Seen a movie in theatre multiple times Helped family with basic tech setup Has been in a club before Uses a VPN Can name AAA security acronym Has gotten a virus before Has worked in a tech position Likes to cook Has played regular bingo before Configured a Raspberry Pi Prefers Light mode Built my own computer Has used Metasploit to run an exploit Athletic Afraid of rollercoasters Has Installed Linux before Completed a full coding project Uses a Password Manager Has jailbroken a device Interested in Leadership Fallen for a phishing email Have gotten my first certification Still has weak passwords Uses an old, embarrassing email address Has read a cybersecurity book
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Plans to attend 4-year after graduation
Working alongside coursework
Addicted to Energy Drinks/Coffee
Loves Math
Plays a musical instrument
Software Development Major
Has or Has Had an Internship/Coop
Configured personal home network
Has given a presentation
Has a pet
Birthday in April
Database Development Major
Traveled internationally
Knows one bad tech joke
Seen a movie in theatre multiple times
Helped family with basic tech setup
Has been in a club before
Uses a VPN
Can name AAA security acronym
Has gotten a virus before
Has worked in a tech position
Likes to cook
Has played regular bingo before
Configured a Raspberry Pi
Prefers Light mode
Built my own computer
Has used Metasploit to run an exploit
Athletic
Afraid of rollercoasters
Has Installed Linux before
Completed a full coding project
Uses a Password Manager
Has jailbroken a device
Interested in Leadership
Fallen for a phishing email
Have gotten my first certification
Still has weak passwords
Uses an old, embarrassing email address
Has read a cybersecurity book