(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
Engaging in appropriate and responsible behavior when using technology
Digital Citizenship
Federal Bureau of Investigation (United States)
FBI
When one experiences a biased, tailored media experience that eliminates opposing viewpoints and differing voices
Echo Chamber
The state of being away from public attention
Privacy
A set of steps that are followed in order to solve a mathematical problem or to complete a computer process
Algorithm
The gaining of unauthorized access to data in a system or computer
Hacking
Websites and applications that enable users to create and share content or to participate in social networking
Social Media
Refers to how you select the potential audience for your ads. Most social advertising platforms allow you to select which users should see your ads based on age, location, gender, interests, and a variety of other factors
Targeting
An electronic tag that assigns a geographical location to a photograph or video, a posting on a social media website, etc.
Geotag
A virtual private network extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network
VPN
A belief that some covert but influential organization is responsible for a circumstance or event
Conspiracy Theory
A generic term for the stream of content you see from other users
Feed
Pertains to a video, image, or written content spreading to numerous online users within a short time period
Viral
The process of converting information or data into a code, especially to prevent unauthorized access
Encryption
The practice of using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer
Cloud (computing/ storage)
A post that can be accessed by anyone; unrestricted or not private
Public (post)
Largest social media platform. Parent company to several other social media platforms.
Facebook
To agree to do or allow something : to give permission for something to happen or be done
Consent
A set of data that describes and gives information about other data
Metadata
Artificial Intelligence
AI
A unique string of characters that identifies each computer using the Internet Protocol to communicate over a network
IP Address
Using a social handle or username of a person or business in your post or photo
Tagging
A piece of writing, image, or other item of content published online, typically on a blog or social media website
Post
The process of luring someone into a relationship by means of a fictional online persona
Catfishing
Any information related to an identifiable person
Personal Data
A part of a computer's memory where information is kept so that the computer can find it very quickly
Cache
Words that are not considered part of the standard vocabulary of a language and that are used very informally in speech especially by a particular group of people
Slang
A computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems
Honeypot
A humorous image, video, piece of text, etc., that is copied (often with slight variations) and spread rapidly by internet users
Meme
The state of being subject only to laws established for the good of the community, especially with regard to freedom of action and speech
Civil Liberty
A word or phrase preceded by a hash sign (#), used on social media websites and applications, especially Twitter, to identify digital content on a specific topic.
Hashtag
A piece of data from a website that is stored within a web browser that the website can retrieve at a later time
Cookies
A string of characters that allows access to a computer system or service
Password
Camera on the screen-side of a phone or computer
Front Camera