DigitalfootprintCookienew inputfor AI toimproveMachinelearningsecurityAlgorithmfollowyouractivity onthe WebunauthorizedcomputeraccessTransparencyArtificialintelligencemanageyouraccountas longandcomplexas you canSoftwarethatlearnshowyouappearPrivacyAIprotectionPasswordSoftwarethatsolvesproblemsTrackingset ofinstructionsSoftwarethattalksDataonlinetrail ofinfosecurityprocessTwo‑stepverificationknowwhat isdone withtheir dataanydigitalinfoSettingsHackerSoftwarethatmakesguessesReputationbit oftext fortrackingDigitalfootprintCookienew inputfor AI toimproveMachinelearningsecurityAlgorithmfollowyouractivity onthe WebunauthorizedcomputeraccessTransparencyArtificialintelligencemanageyouraccountas longandcomplexas you canSoftwarethatlearnshowyouappearPrivacyAIprotectionPasswordSoftwarethatsolvesproblemsTrackingset ofinstructionsSoftwarethattalksDataonlinetrail ofinfosecurityprocessTwo‑stepverificationknowwhat isdone withtheir dataanydigitalinfoSettingsHackerSoftwarethatmakesguessesReputationbit oftext fortracking

Secure Your Secrets - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
  1. Digital footprint
  2. Cookie
  3. new input for AI to improve
  4. Machine learning
  5. security
  6. Algorithm
  7. follow your activity on the Web
  8. unauthorized computer access
  9. Transparency
  10. Artificial intelligence
  11. manage your account
  12. as long and complex as you can
  13. Software that learns
  14. how you appear
  15. Privacy
  16. AI
  17. protection
  18. Password
  19. Software that solves problems
  20. Tracking
  21. set of instructions
  22. Software that talks
  23. Data
  24. online trail of info
  25. security process
  26. Two‑step verification
  27. know what is done with their data
  28. any digital info
  29. Settings
  30. Hacker
  31. Software that makes guesses
  32. Reputation
  33. bit of text for tracking