DataSoftwarethattalksAIas longandcomplexas you canMachinelearningSoftwarethatlearnsSettingsSoftwarethatmakesguessesmanageyouraccountDigitalfootprintsecurityprocessknowwhat isdone withtheir datahowyouappearbit oftext fortrackingCookieAlgorithmprotectionPasswordTwo‑stepverificationPrivacyfollowyouractivity onthe Webset ofinstructionsunauthorizedcomputeraccessSoftwarethatsolvesproblemsTrackingReputationArtificialintelligencenew inputfor AI toimproveonlinetrail ofinfosecurityHackeranydigitalinfoTransparencyDataSoftwarethattalksAIas longandcomplexas you canMachinelearningSoftwarethatlearnsSettingsSoftwarethatmakesguessesmanageyouraccountDigitalfootprintsecurityprocessknowwhat isdone withtheir datahowyouappearbit oftext fortrackingCookieAlgorithmprotectionPasswordTwo‑stepverificationPrivacyfollowyouractivity onthe Webset ofinstructionsunauthorizedcomputeraccessSoftwarethatsolvesproblemsTrackingReputationArtificialintelligencenew inputfor AI toimproveonlinetrail ofinfosecurityHackeranydigitalinfoTransparency

Secure Your Secrets - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
  1. Data
  2. Software that talks
  3. AI
  4. as long and complex as you can
  5. Machine learning
  6. Software that learns
  7. Settings
  8. Software that makes guesses
  9. manage your account
  10. Digital footprint
  11. security process
  12. know what is done with their data
  13. how you appear
  14. bit of text for tracking
  15. Cookie
  16. Algorithm
  17. protection
  18. Password
  19. Two‑step verification
  20. Privacy
  21. follow your activity on the Web
  22. set of instructions
  23. unauthorized computer access
  24. Software that solves problems
  25. Tracking
  26. Reputation
  27. Artificial intelligence
  28. new input for AI to improve
  29. online trail of info
  30. security
  31. Hacker
  32. any digital info
  33. Transparency