EmailBrowserWANNetworkOperatingSystemWWWFirewallPeer-to-PeerDomainNameStarTopologyCloudServerTopographyChatWi-FiIPAddressArpanetWANSearchEngineEmojisPhishingSwitchDataWebpageDiagnosticToolsRouterBusTopologyLANSecurityManagementDSLFirefoxBandwidthLANServerNetworkSpamWifiISPTroubleshootingBlogInternetStreamingBluetoothCybersecurityInternetFirewallBroadbandResourceAllocationVirusProtocolEmailBrowserWANNetworkOperatingSystemWWWFirewallPeer-to-PeerDomainNameStarTopologyCloudServerTopographyChatWi-FiIPAddressArpanetWANSearchEngineEmojisPhishingSwitchDataWebpageDiagnosticToolsRouterBusTopologyLANSecurityManagementDSLFirefoxBandwidthLANServerNetworkSpamWifiISPTroubleshootingBlogInternetStreamingBluetoothCybersecurityInternetFirewallBroadbandResourceAllocationVirusProtocol

Computer - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
N
3
O
4
I
5
N
6
O
7
O
8
B
9
N
10
O
11
N
12
B
13
B
14
N
15
G
16
N
17
G
18
G
19
I
20
N
21
I
22
N
23
G
24
N
25
B
26
G
27
B
28
O
29
G
30
O
31
I
32
B
33
I
34
I
35
I
36
I
37
B
38
B
39
O
40
O
41
O
42
B
43
B
44
G
45
G
46
O
47
G
48
I
49
G
  1. I-Email
  2. N-Browser
  3. O-WAN
  4. I-Network Operating System
  5. N-WWW
  6. O-Firewall
  7. O-Peer-to-Peer
  8. B-Domain Name
  9. N-Star Topology
  10. O-Cloud
  11. N-Server
  12. B-Topography
  13. B-Chat
  14. N-Wi-Fi
  15. G-IP Address
  16. N-Arpanet
  17. G-WAN
  18. G-Search Engine
  19. I-Emojis
  20. N-Phishing
  21. I-Switch
  22. N-Data
  23. G-Webpage
  24. N-Diagnostic Tools
  25. B-Router
  26. G-Bus Topology
  27. B-LAN
  28. O-Security Management
  29. G-DSL
  30. O-Firefox
  31. I-Bandwidth
  32. B-LAN
  33. I-Server
  34. I-Network
  35. I-Spam
  36. I-Wifi
  37. B-ISP
  38. B-Troubleshooting
  39. O-Blog
  40. O-Internet
  41. O-Streaming
  42. B-Bluetooth
  43. B-Cybersecurity
  44. G-Internet
  45. G-Firewall
  46. O-Broadband
  47. G-Resource Allocation
  48. I-Virus
  49. G-Protocol