(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
Engaging in appropriate and responsible behavior when using technology
Digital Citizenship
A unique string of characters that identifies each computer using the Internet Protocol to communicate over a network
IP Address
Pertains to a video, image, or written content spreading to numerous online users within a short time period
Viral
The gaining of unauthorized access to data in a system or computer
Hacking
A computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems
Honeypot
A piece of data from a website that is stored within a web browser that the website can retrieve at a later time
Cookies
Camera on the screen-side of a phone or computer
Front Camera
A post that can be accessed by anyone; unrestricted or not private
Public (post)
Using a social handle or username of a person or business in your post or photo
Tagging
A piece of writing, image, or other item of content published online, typically on a blog or social media website
Post
A set of data that describes and gives information about other data
Metadata
The process of luring someone into a relationship by means of a fictional online persona
Catfishing
A generic term for the stream of content you see from other users
Feed
Artificial Intelligence
AI
A string of characters that allows access to a computer system or service
Password
The practice of using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer
Cloud (computing/ storage)
The process of converting information or data into a code, especially to prevent unauthorized access
Encryption
The state of being subject only to laws established for the good of the community, especially with regard to freedom of action and speech
Civil Liberty
The state of being away from public attention
Privacy
To agree to do or allow something : to give permission for something to happen or be done
Consent
Websites and applications that enable users to create and share content or to participate in social networking
Social Media
A humorous image, video, piece of text, etc., that is copied (often with slight variations) and spread rapidly by internet users
Meme
A word or phrase preceded by a hash sign (#), used on social media websites and applications, especially Twitter, to identify digital content on a specific topic.
Hashtag
A belief that some covert but influential organization is responsible for a circumstance or event
Conspiracy Theory
Largest social media platform. Parent company to several other social media platforms.
Facebook
A virtual private network extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network
VPN
Federal Bureau of Investigation (United States)
FBI
Refers to how you select the potential audience for your ads. Most social advertising platforms allow you to select which users should see your ads based on age, location, gender, interests, and a variety of other factors
Targeting
A set of steps that are followed in order to solve a mathematical problem or to complete a computer process
Algorithm
An electronic tag that assigns a geographical location to a photograph or video, a posting on a social media website, etc.
Geotag
Words that are not considered part of the standard vocabulary of a language and that are used very informally in speech especially by a particular group of people
Slang
When one experiences a biased, tailored media experience that eliminates opposing viewpoints and differing voices
Echo Chamber
Any information related to an identifiable person
Personal Data
A part of a computer's memory where information is kept so that the computer can find it very quickly
Cache