Algorithmfollowyouractivity onthe WebsecurityprocessPasswordknowwhat isdone withtheir datahowyouappearnew inputfor AI toimproveSoftwarethattalksset ofinstructionsDataSoftwarethatlearnsunauthorizedcomputeraccessSoftwarethatmakesguessesCookieDigitalfootprintbit oftext fortrackingas longandcomplexas you canHackermanageyouraccountSettingsPrivacyanydigitalinfoSoftwarethatsolvesproblemsMachinelearningonlinetrail ofinfoReputationTrackingTwo‑stepverificationsecurityAIArtificialintelligenceTransparencyprotectionAlgorithmfollowyouractivity onthe WebsecurityprocessPasswordknowwhat isdone withtheir datahowyouappearnew inputfor AI toimproveSoftwarethattalksset ofinstructionsDataSoftwarethatlearnsunauthorizedcomputeraccessSoftwarethatmakesguessesCookieDigitalfootprintbit oftext fortrackingas longandcomplexas you canHackermanageyouraccountSettingsPrivacyanydigitalinfoSoftwarethatsolvesproblemsMachinelearningonlinetrail ofinfoReputationTrackingTwo‑stepverificationsecurityAIArtificialintelligenceTransparencyprotection

Secure Your Secrets - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
  1. Algorithm
  2. follow your activity on the Web
  3. security process
  4. Password
  5. know what is done with their data
  6. how you appear
  7. new input for AI to improve
  8. Software that talks
  9. set of instructions
  10. Data
  11. Software that learns
  12. unauthorized computer access
  13. Software that makes guesses
  14. Cookie
  15. Digital footprint
  16. bit of text for tracking
  17. as long and complex as you can
  18. Hacker
  19. manage your account
  20. Settings
  21. Privacy
  22. any digital info
  23. Software that solves problems
  24. Machine learning
  25. online trail of info
  26. Reputation
  27. Tracking
  28. Two‑step verification
  29. security
  30. AI
  31. Artificial intelligence
  32. Transparency
  33. protection