deep fake digital divide phishing Augmented reality passwords cyber safety Social media Artificial intelligence upskilling Freedom of information hardware failures Personal Cloud legal issues data breaches senate inquiry Ethical considerations collaborative tool copyright laws data outage data theft Immersive technologies Virtual reality, Virtual Personal Assistant (VPA) Hacking privacy deep fake digital divide phishing Augmented reality passwords cyber safety Social media Artificial intelligence upskilling Freedom of information hardware failures Personal Cloud legal issues data breaches senate inquiry Ethical considerations collaborative tool copyright laws data outage data theft Immersive technologies Virtual reality, Virtual Personal Assistant (VPA) Hacking privacy
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
deep fake
digital divide
phishing
Augmented reality
passwords
cyber safety
Social media
Artificial intelligence
upskilling
Freedom of information
hardware failures
Personal Cloud
legal issues
data breaches
senate inquiry
Ethical considerations
collaborative tool
copyright laws
data outage
data theft
Immersive technologies
Virtual reality,
Virtual Personal Assistant (VPA)
Hacking
privacy