QualitativedataOutcomesEditorUniqueIdentifierBetteroffAccessControlBarChartWhoImpactContributionDataRetentionPolicyProtectedHealthInformation(PHI)PrescriptiveAnalyticsMulti-FactorAuthentication(MFA)ImpactAttributionImpactMeasurementandManagement(IMM)PieChartObjectiveTheme(s)KeyImpactIndicator(KII)DataBreachDiagnosticAnalyticsDataManagementQualityDataProtectionStringQuantitativedataPersonallyIdentifiableInformation(PII)CausationDimensionDataPrivacyLeverageAnalyzeDataValidationOrgAdminWhatCorrelationClusterChartCybersecurityCommunityContributionOutlierViewerDataGovernanceDefineDescriptiveAnalyticsPredictiveAnalyticsResultsBasedAccountability(RBA)ImpactFrameworkDistinctCountCollectQualitativedataOutcomesEditorUniqueIdentifierBetteroffAccessControlBarChartWhoImpactContributionDataRetentionPolicyProtectedHealthInformation(PHI)PrescriptiveAnalyticsMulti-FactorAuthentication(MFA)ImpactAttributionImpactMeasurementandManagement(IMM)PieChartObjectiveTheme(s)KeyImpactIndicator(KII)DataBreachDiagnosticAnalyticsDataManagementQualityDataProtectionStringQuantitativedataPersonallyIdentifiableInformation(PII)CausationDimensionDataPrivacyLeverageAnalyzeDataValidationOrgAdminWhatCorrelationClusterChartCybersecurityCommunityContributionOutlierViewerDataGovernanceDefineDescriptiveAnalyticsPredictiveAnalyticsResultsBasedAccountability(RBA)ImpactFrameworkDistinctCountCollect

Data is Fun :) - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Qualitative data
  2. Outcomes
  3. Editor
  4. Unique Identifier
  5. Better off
  6. Access Control
  7. Bar Chart
  8. Who
  9. Impact Contribution
  10. Data Retention Policy
  11. Protected Health Information (PHI)
  12. Prescriptive Analytics
  13. Multi-Factor Authentication (MFA)
  14. Impact Attribution
  15. Impact Measurement and Management (IMM)
  16. Pie Chart
  17. Objective
  18. Theme(s)
  19. Key Impact Indicator (KII)
  20. Data Breach
  21. Diagnostic Analytics
  22. Data Management
  23. Quality
  24. Data Protection
  25. String
  26. Quantitative data
  27. Personally Identifiable Information (PII)
  28. Causation
  29. Dimension
  30. Data Privacy
  31. Leverage
  32. Analyze
  33. Data Validation
  34. Org Admin
  35. What
  36. Correlation
  37. Cluster Chart
  38. Cybersecurity
  39. Community Contribution
  40. Outlier
  41. Viewer
  42. Data Governance
  43. Define
  44. Descriptive Analytics
  45. Predictive Analytics
  46. Results Based Accountability (RBA)
  47. Impact Framework
  48. Distinct Count
  49. Collect