(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
Refers to how you select the potential audience for your ads. Most social advertising platforms allow you to select which users should see your ads based on age, location, gender, interests, and a variety of other factors
Targeting
A word or phrase preceded by a hash sign (#), used on social media websites and applications, especially Twitter, to identify digital content on a specific topic.
Hashtag
A piece of data from a website that is stored within a web browser that the website can retrieve at a later time
Cookies
The practice of using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer
Cloud (computing/ storage)
Words that are not considered part of the standard vocabulary of a language and that are used very informally in speech especially by a particular group of people
Slang
Websites and applications that enable users to create and share content or to participate in social networking
Social Media
When one experiences a biased, tailored media experience that eliminates opposing viewpoints and differing voices
Echo Chamber
Camera on the screen-side of a phone or computer
Front Camera
Using a social handle or username of a person or business in your post or photo
Tagging
Federal Bureau of Investigation (United States)
FBI
A generic term for the stream of content you see from other users
Feed
A post that can be accessed by anyone; unrestricted or not private
Public (post)
To agree to do or allow something : to give permission for something to happen or be done
Consent
Pertains to a video, image, or written content spreading to numerous online users within a short time period
Viral
The process of luring someone into a relationship by means of a fictional online persona
Catfishing
A set of steps that are followed in order to solve a mathematical problem or to complete a computer process
Algorithm
A humorous image, video, piece of text, etc., that is copied (often with slight variations) and spread rapidly by internet users
Meme
A virtual private network extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network
VPN
A set of data that describes and gives information about other data
Metadata
The gaining of unauthorized access to data in a system or computer
Hacking
A computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems
Honeypot
Engaging in appropriate and responsible behavior when using technology
Digital Citizenship
Largest social media platform. Parent company to several other social media platforms.
Facebook
Artificial Intelligence
AI
A unique string of characters that identifies each computer using the Internet Protocol to communicate over a network
IP Address
A string of characters that allows access to a computer system or service
Password
Any information related to an identifiable person
Personal Data
A part of a computer's memory where information is kept so that the computer can find it very quickly
Cache
An electronic tag that assigns a geographical location to a photograph or video, a posting on a social media website, etc.
Geotag
The state of being away from public attention
Privacy
A piece of writing, image, or other item of content published online, typically on a blog or social media website
Post
A belief that some covert but influential organization is responsible for a circumstance or event
Conspiracy Theory
The process of converting information or data into a code, especially to prevent unauthorized access
Encryption
The state of being subject only to laws established for the good of the community, especially with regard to freedom of action and speech
Civil Liberty