phishing data outage Virtual reality, Ethical considerations passwords cyber safety collaborative tool Immersive technologies upskilling copyright laws Freedom of information deep fake digital divide legal issues data breaches privacy data theft Personal Cloud Virtual Personal Assistant (VPA) Augmented reality senate inquiry Artificial intelligence hardware failures Social media Hacking phishing data outage Virtual reality, Ethical considerations passwords cyber safety collaborative tool Immersive technologies upskilling copyright laws Freedom of information deep fake digital divide legal issues data breaches privacy data theft Personal Cloud Virtual Personal Assistant (VPA) Augmented reality senate inquiry Artificial intelligence hardware failures Social media Hacking
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
phishing
data outage
Virtual reality,
Ethical considerations
passwords
cyber safety
collaborative tool
Immersive technologies
upskilling
copyright laws
Freedom of information
deep fake
digital divide
legal issues
data breaches
privacy
data theft
Personal Cloud
Virtual Personal Assistant (VPA)
Augmented reality
senate inquiry
Artificial intelligence
hardware failures
Social media
Hacking