onlinetrail ofinfohowyouappearprotectionPasswordTrackingAISoftwarethatsolvesproblemssecuritybit oftext fortrackingsecurityprocessAlgorithmunauthorizedcomputeraccessSoftwarethatlearnsmanageyouraccountfollowyouractivity onthe Webas longandcomplexas you canPrivacyArtificialintelligenceDataSoftwarethattalksset ofinstructionsTwo‑stepverificationTransparencynew inputfor AI toimproveanydigitalinfoReputationSettingsHackerknowwhat isdone withtheir dataMachinelearningDigitalfootprintSoftwarethatmakesguessesCookieonlinetrail ofinfohowyouappearprotectionPasswordTrackingAISoftwarethatsolvesproblemssecuritybit oftext fortrackingsecurityprocessAlgorithmunauthorizedcomputeraccessSoftwarethatlearnsmanageyouraccountfollowyouractivity onthe Webas longandcomplexas you canPrivacyArtificialintelligenceDataSoftwarethattalksset ofinstructionsTwo‑stepverificationTransparencynew inputfor AI toimproveanydigitalinfoReputationSettingsHackerknowwhat isdone withtheir dataMachinelearningDigitalfootprintSoftwarethatmakesguessesCookie

Secure Your Secrets - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
  1. online trail of info
  2. how you appear
  3. protection
  4. Password
  5. Tracking
  6. AI
  7. Software that solves problems
  8. security
  9. bit of text for tracking
  10. security process
  11. Algorithm
  12. unauthorized computer access
  13. Software that learns
  14. manage your account
  15. follow your activity on the Web
  16. as long and complex as you can
  17. Privacy
  18. Artificial intelligence
  19. Data
  20. Software that talks
  21. set of instructions
  22. Two‑step verification
  23. Transparency
  24. new input for AI to improve
  25. any digital info
  26. Reputation
  27. Settings
  28. Hacker
  29. know what is done with their data
  30. Machine learning
  31. Digital footprint
  32. Software that makes guesses
  33. Cookie