Dark Web Cybercrime Cyberextortionist Hacker Signature Verification Biometric Security Firewall Worm Cyberterrorist Script Kiddie Backdoor Fingerprint Reader Iris Scanner Payload Adware HActivist Authentication Facial Recognition Digital Detox Digital Security Risk Spyware Virus Rootkit Voice Verification Hand Geometry Cracker Digital Forencis Malware Retinal Scanner Trojan Horse Dark Web Cybercrime Cyberextortionist Hacker Signature Verification Biometric Security Firewall Worm Cyberterrorist Script Kiddie Backdoor Fingerprint Reader Iris Scanner Payload Adware HActivist Authentication Facial Recognition Digital Detox Digital Security Risk Spyware Virus Rootkit Voice Verification Hand Geometry Cracker Digital Forencis Malware Retinal Scanner Trojan Horse
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Dark Web
Cybercrime
Cyberextortionist
Hacker
Signature Verification
Biometric Security
Firewall
Worm
Cyberterrorist
Script Kiddie
Backdoor
Fingerprint Reader
Iris Scanner
Payload
Adware
HActivist
Authentication
Facial Recognition
Digital Detox
Digital Security Risk
Spyware
Virus
Rootkit
Voice Verification
Hand Geometry
Cracker
Digital Forencis
Malware
Retinal Scanner
Trojan Horse