new input for AI to improve Algorithm Hacker Software that solves problems know what is done with their data Reputation protection any digital info online trail of info unauthorized computer access Software that talks Transparency Tracking Data Settings Machine learning Cookie Privacy follow your activity on the Web Password bit of text for tracking manage your account security Artificial intelligence Software that learns security process Digital footprint as long and complex as you can AI Software that makes guesses how you appear set of instructions Two‑step verification new input for AI to improve Algorithm Hacker Software that solves problems know what is done with their data Reputation protection any digital info online trail of info unauthorized computer access Software that talks Transparency Tracking Data Settings Machine learning Cookie Privacy follow your activity on the Web Password bit of text for tracking manage your account security Artificial intelligence Software that learns security process Digital footprint as long and complex as you can AI Software that makes guesses how you appear set of instructions Two‑step verification
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
new input for AI to improve
Algorithm
Hacker
Software that solves problems
know what is done with their data
Reputation
protection
any digital info
online trail of info
unauthorized computer access
Software that talks
Transparency
Tracking
Data
Settings
Machine learning
Cookie
Privacy
follow your activity on the Web
Password
bit of text for tracking
manage your account
security
Artificial intelligence
Software that learns
security process
Digital footprint
as long and complex as you can
AI
Software that makes
guesses
how you appear
set of instructions
Two‑step verification