TargetingRefers to how you selectthe potential audience foryour ads. Most socialadvertising platforms allowyou to select which usersshould see your ads basedon age, location, gender,interests, and a variety ofother factorsHashtagA word or phrasepreceded by a hashsign (#), used on socialmedia websites andapplications, especiallyTwitter, to identifydigital content on aspecific topic.CookiesA piece of data froma website that isstored within a webbrowser that thewebsite can retrieveat a later timeCloud(computing/storage)The practice of usinga network of remoteservers hosted on theinternet to store,manage, and processdata, rather than alocal server or apersonal computerSlangWords that are notconsidered part of thestandard vocabulary ofa language and thatare used veryinformally in speechespecially by aparticular group ofpeopleSocialMediaWebsites andapplications thatenable users tocreate and sharecontent or toparticipate in socialnetworkingEchoChamberWhen oneexperiences abiased, tailoredmedia experiencethat eliminatesopposing viewpointsand differing voicesFrontCameraCamera onthe screen-side of aphone orcomputerTaggingUsing a socialhandle orusername of aperson orbusiness in yourpost or photoFBIFederalBureau ofInvestigation(UnitedStates)FeedA generic termfor the streamof content yousee from otherusersPublic(post)A post that canbe accessed byanyone;unrestricted ornot privateConsentTo agree to do orallow something :to give permissionfor something tohappen or be doneViralPertains to avideo, image, orwritten contentspreading tonumerous onlineusers within ashort time periodCatfishingThe process ofluring someoneinto a relationshipby means of afictional onlinepersonaAlgorithmA set of steps thatare followed inorder to solve amathematicalproblem or tocomplete acomputer processMemeA humorous image,video, piece of text,etc., that is copied(often with slightvariations) andspread rapidly byinternet usersVPNA virtual private networkextends a private networkacross a public networkand enables users to sendand receive data acrossshared or public networksas if their computingdevices were directlyconnected to the privatenetworkMetadataA set of datathat describesand givesinformationabout otherdataHackingThe gaining ofunauthorizedaccess to datain a system orcomputerHoneypotA computer securitymechanism set todetect, deflect, or, insome manner,counteract attemptsat unauthorized useof informationsystemsDigitalCitizenshipEngaging inappropriate andresponsiblebehavior whenusingtechnologyFacebookLargest socialmedia platform.Parent company toseveral othersocial mediaplatforms.AIArtificialIntelligenceIPAddressA unique string ofcharacters thatidentifies eachcomputer using theInternet Protocol tocommunicate over anetworkPasswordA string ofcharacters thatallows access toa computersystem orservicePersonalDataAnyinformationrelated to anidentifiablepersonCacheA part of acomputer's memorywhere information iskept so that thecomputer can find itvery quicklyGeotagAn electronic tag thatassigns ageographical locationto a photograph orvideo, a posting on asocial media website,etc.PrivacyThe state ofbeing awayfrom publicattentionPostA piece of writing,image, or other itemof content publishedonline, typically ona blog or socialmedia websiteConspiracyTheoryA belief that somecovert butinfluentialorganization isresponsible for acircumstance oreventEncryptionThe process ofconvertinginformation or datainto a code,especially to preventunauthorized accessCivilLibertyThe state of beingsubject only to lawsestablished for thegood of thecommunity,especially with regardto freedom of actionand speechTargetingRefers to how you selectthe potential audience foryour ads. Most socialadvertising platforms allowyou to select which usersshould see your ads basedon age, location, gender,interests, and a variety ofother factorsHashtagA word or phrasepreceded by a hashsign (#), used on socialmedia websites andapplications, especiallyTwitter, to identifydigital content on aspecific topic.CookiesA piece of data froma website that isstored within a webbrowser that thewebsite can retrieveat a later timeCloud(computing/storage)The practice of usinga network of remoteservers hosted on theinternet to store,manage, and processdata, rather than alocal server or apersonal computerSlangWords that are notconsidered part of thestandard vocabulary ofa language and thatare used veryinformally in speechespecially by aparticular group ofpeopleSocialMediaWebsites andapplications thatenable users tocreate and sharecontent or toparticipate in socialnetworkingEchoChamberWhen oneexperiences abiased, tailoredmedia experiencethat eliminatesopposing viewpointsand differing voicesFrontCameraCamera onthe screen-side of aphone orcomputerTaggingUsing a socialhandle orusername of aperson orbusiness in yourpost or photoFBIFederalBureau ofInvestigation(UnitedStates)FeedA generic termfor the streamof content yousee from otherusersPublic(post)A post that canbe accessed byanyone;unrestricted ornot privateConsentTo agree to do orallow something :to give permissionfor something tohappen or be doneViralPertains to avideo, image, orwritten contentspreading tonumerous onlineusers within ashort time periodCatfishingThe process ofluring someoneinto a relationshipby means of afictional onlinepersonaAlgorithmA set of steps thatare followed inorder to solve amathematicalproblem or tocomplete acomputer processMemeA humorous image,video, piece of text,etc., that is copied(often with slightvariations) andspread rapidly byinternet usersVPNA virtual private networkextends a private networkacross a public networkand enables users to sendand receive data acrossshared or public networksas if their computingdevices were directlyconnected to the privatenetworkMetadataA set of datathat describesand givesinformationabout otherdataHackingThe gaining ofunauthorizedaccess to datain a system orcomputerHoneypotA computer securitymechanism set todetect, deflect, or, insome manner,counteract attemptsat unauthorized useof informationsystemsDigitalCitizenshipEngaging inappropriate andresponsiblebehavior whenusingtechnologyFacebookLargest socialmedia platform.Parent company toseveral othersocial mediaplatforms.AIArtificialIntelligenceIPAddressA unique string ofcharacters thatidentifies eachcomputer using theInternet Protocol tocommunicate over anetworkPasswordA string ofcharacters thatallows access toa computersystem orservicePersonalDataAnyinformationrelated to anidentifiablepersonCacheA part of acomputer's memorywhere information iskept so that thecomputer can find itvery quicklyGeotagAn electronic tag thatassigns ageographical locationto a photograph orvideo, a posting on asocial media website,etc.PrivacyThe state ofbeing awayfrom publicattentionPostA piece of writing,image, or other itemof content publishedonline, typically ona blog or socialmedia websiteConspiracyTheoryA belief that somecovert butinfluentialorganization isresponsible for acircumstance oreventEncryptionThe process ofconvertinginformation or datainto a code,especially to preventunauthorized accessCivilLibertyThe state of beingsubject only to lawsestablished for thegood of thecommunity,especially with regardto freedom of actionand speech

Social Media Surveillance - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
  1. Refers to how you select the potential audience for your ads. Most social advertising platforms allow you to select which users should see your ads based on age, location, gender, interests, and a variety of other factors
    Targeting
  2. A word or phrase preceded by a hash sign (#), used on social media websites and applications, especially Twitter, to identify digital content on a specific topic.
    Hashtag
  3. A piece of data from a website that is stored within a web browser that the website can retrieve at a later time
    Cookies
  4. The practice of using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer
    Cloud (computing/ storage)
  5. Words that are not considered part of the standard vocabulary of a language and that are used very informally in speech especially by a particular group of people
    Slang
  6. Websites and applications that enable users to create and share content or to participate in social networking
    Social Media
  7. When one experiences a biased, tailored media experience that eliminates opposing viewpoints and differing voices
    Echo Chamber
  8. Camera on the screen-side of a phone or computer
    Front Camera
  9. Using a social handle or username of a person or business in your post or photo
    Tagging
  10. Federal Bureau of Investigation (United States)
    FBI
  11. A generic term for the stream of content you see from other users
    Feed
  12. A post that can be accessed by anyone; unrestricted or not private
    Public (post)
  13. To agree to do or allow something : to give permission for something to happen or be done
    Consent
  14. Pertains to a video, image, or written content spreading to numerous online users within a short time period
    Viral
  15. The process of luring someone into a relationship by means of a fictional online persona
    Catfishing
  16. A set of steps that are followed in order to solve a mathematical problem or to complete a computer process
    Algorithm
  17. A humorous image, video, piece of text, etc., that is copied (often with slight variations) and spread rapidly by internet users
    Meme
  18. A virtual private network extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network
    VPN
  19. A set of data that describes and gives information about other data
    Metadata
  20. The gaining of unauthorized access to data in a system or computer
    Hacking
  21. A computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems
    Honeypot
  22. Engaging in appropriate and responsible behavior when using technology
    Digital Citizenship
  23. Largest social media platform. Parent company to several other social media platforms.
    Facebook
  24. Artificial Intelligence
    AI
  25. A unique string of characters that identifies each computer using the Internet Protocol to communicate over a network
    IP Address
  26. A string of characters that allows access to a computer system or service
    Password
  27. Any information related to an identifiable person
    Personal Data
  28. A part of a computer's memory where information is kept so that the computer can find it very quickly
    Cache
  29. An electronic tag that assigns a geographical location to a photograph or video, a posting on a social media website, etc.
    Geotag
  30. The state of being away from public attention
    Privacy
  31. A piece of writing, image, or other item of content published online, typically on a blog or social media website
    Post
  32. A belief that some covert but influential organization is responsible for a circumstance or event
    Conspiracy Theory
  33. The process of converting information or data into a code, especially to prevent unauthorized access
    Encryption
  34. The state of being subject only to laws established for the good of the community, especially with regard to freedom of action and speech
    Civil Liberty