Artificial intelligence data breaches cyber safety upskilling Social media passwords legal issues Virtual Personal Assistant (VPA) Freedom of information Augmented reality digital divide data outage hardware failures Ethical considerations deep fake senate inquiry Personal Cloud copyright laws collaborative tool privacy Hacking Immersive technologies Virtual reality, data theft phishing Artificial intelligence data breaches cyber safety upskilling Social media passwords legal issues Virtual Personal Assistant (VPA) Freedom of information Augmented reality digital divide data outage hardware failures Ethical considerations deep fake senate inquiry Personal Cloud copyright laws collaborative tool privacy Hacking Immersive technologies Virtual reality, data theft phishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Artificial intelligence
data breaches
cyber safety
upskilling
Social media
passwords
legal issues
Virtual Personal Assistant (VPA)
Freedom of information
Augmented reality
digital divide
data outage
hardware failures
Ethical considerations
deep fake
senate inquiry
Personal Cloud
copyright laws
collaborative tool
privacy
Hacking
Immersive technologies
Virtual reality,
data theft
phishing