manageyouraccountMachinelearningPasswordonlinetrail ofinfosecurityprocessprotectionunauthorizedcomputeraccessSoftwarethatmakesguessesTwo‑stepverificationReputationas longandcomplexas you canSoftwarethattalksSettingsSoftwarethatsolvesproblemsnew inputfor AI toimproveDigitalfootprintknowwhat isdone withtheir datahowyouappearSoftwarethatlearnsset ofinstructionsPrivacyDataAITrackingbit oftext fortrackingAlgorithmsecurityfollowyouractivity onthe WebHackeranydigitalinfoTransparencyArtificialintelligenceCookiemanageyouraccountMachinelearningPasswordonlinetrail ofinfosecurityprocessprotectionunauthorizedcomputeraccessSoftwarethatmakesguessesTwo‑stepverificationReputationas longandcomplexas you canSoftwarethattalksSettingsSoftwarethatsolvesproblemsnew inputfor AI toimproveDigitalfootprintknowwhat isdone withtheir datahowyouappearSoftwarethatlearnsset ofinstructionsPrivacyDataAITrackingbit oftext fortrackingAlgorithmsecurityfollowyouractivity onthe WebHackeranydigitalinfoTransparencyArtificialintelligenceCookie

Secure Your Secrets - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
  1. manage your account
  2. Machine learning
  3. Password
  4. online trail of info
  5. security process
  6. protection
  7. unauthorized computer access
  8. Software that makes guesses
  9. Two‑step verification
  10. Reputation
  11. as long and complex as you can
  12. Software that talks
  13. Settings
  14. Software that solves problems
  15. new input for AI to improve
  16. Digital footprint
  17. know what is done with their data
  18. how you appear
  19. Software that learns
  20. set of instructions
  21. Privacy
  22. Data
  23. AI
  24. Tracking
  25. bit of text for tracking
  26. Algorithm
  27. security
  28. follow your activity on the Web
  29. Hacker
  30. any digital info
  31. Transparency
  32. Artificial intelligence
  33. Cookie