Premises Cabling Server Management Penetration Testing & Penetration Testing Vulnerability Analysis Electricity Cyber Law & Ethics Databases & Client/Server Programming Incident Management Networking II Introduction to Windows Scripting Cyber Security Cyber Warfare Introduction to C/C++ Digital Literacy & Applications Database I Programming Web Design I Senior Seminar Microcomputers Applied Network Security Fiber Optics Networking I Advanced Programming Concepts Wireless Security Network Infrastructure I Database Research Design Linux Computer Security & Forensics Visual Programming Premises Cabling Server Management Penetration Testing & Penetration Testing Vulnerability Analysis Electricity Cyber Law & Ethics Databases & Client/Server Programming Incident Management Networking II Introduction to Windows Scripting Cyber Security Cyber Warfare Introduction to C/C++ Digital Literacy & Applications Database I Programming Web Design I Senior Seminar Microcomputers Applied Network Security Fiber Optics Networking I Advanced Programming Concepts Wireless Security Network Infrastructure I Database Research Design Linux Computer Security & Forensics Visual Programming
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Premises Cabling
Server Management
Penetration Testing & Penetration Testing Vulnerability Analysis
Electricity
Cyber Law & Ethics
Databases & Client/Server Programming
Incident Management
Networking II
Introduction to Windows Scripting
Cyber Security
Cyber Warfare
Introduction to C/C++
Digital Literacy & Applications
Database I
Programming
Web Design I
Senior Seminar
Microcomputers
Applied Network Security
Fiber Optics
Networking I
Advanced Programming Concepts
Wireless Security
Network Infrastructure I
Database
Research Design
Linux
Computer Security & Forensics
Visual Programming