new inputfor AI toimproveAlgorithmHackerSoftwarethatsolvesproblemsknowwhat isdone withtheir dataReputationprotectionanydigitalinfoonlinetrail ofinfounauthorizedcomputeraccessSoftwarethattalksTransparencyTrackingDataSettingsMachinelearningCookiePrivacyfollowyouractivity onthe WebPasswordbit oftext fortrackingmanageyouraccountsecurityArtificialintelligenceSoftwarethatlearnssecurityprocessDigitalfootprintas longandcomplexas you canAISoftwarethatmakesguesseshowyouappearset ofinstructionsTwo‑stepverificationnew inputfor AI toimproveAlgorithmHackerSoftwarethatsolvesproblemsknowwhat isdone withtheir dataReputationprotectionanydigitalinfoonlinetrail ofinfounauthorizedcomputeraccessSoftwarethattalksTransparencyTrackingDataSettingsMachinelearningCookiePrivacyfollowyouractivity onthe WebPasswordbit oftext fortrackingmanageyouraccountsecurityArtificialintelligenceSoftwarethatlearnssecurityprocessDigitalfootprintas longandcomplexas you canAISoftwarethatmakesguesseshowyouappearset ofinstructionsTwo‑stepverification

Secure Your Secrets - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
  1. new input for AI to improve
  2. Algorithm
  3. Hacker
  4. Software that solves problems
  5. know what is done with their data
  6. Reputation
  7. protection
  8. any digital info
  9. online trail of info
  10. unauthorized computer access
  11. Software that talks
  12. Transparency
  13. Tracking
  14. Data
  15. Settings
  16. Machine learning
  17. Cookie
  18. Privacy
  19. follow your activity on the Web
  20. Password
  21. bit of text for tracking
  22. manage your account
  23. security
  24. Artificial intelligence
  25. Software that learns
  26. security process
  27. Digital footprint
  28. as long and complex as you can
  29. AI
  30. Software that makes guesses
  31. how you appear
  32. set of instructions
  33. Two‑step verification