phishing Freedom of information data breaches Artificial intelligence collaborative tool Personal Cloud Virtual reality, copyright laws Hacking passwords digital divide Ethical considerations cyber safety deep fake Virtual Personal Assistant (VPA) Social media upskilling data theft data outage Immersive technologies privacy senate inquiry legal issues hardware failures Augmented reality phishing Freedom of information data breaches Artificial intelligence collaborative tool Personal Cloud Virtual reality, copyright laws Hacking passwords digital divide Ethical considerations cyber safety deep fake Virtual Personal Assistant (VPA) Social media upskilling data theft data outage Immersive technologies privacy senate inquiry legal issues hardware failures Augmented reality
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
phishing
Freedom of information
data breaches
Artificial intelligence
collaborative tool
Personal Cloud
Virtual reality,
copyright laws
Hacking
passwords
digital divide
Ethical considerations
cyber safety
deep fake
Virtual Personal Assistant (VPA)
Social media
upskilling
data theft
data outage
Immersive technologies
privacy
senate inquiry
legal issues
hardware failures
Augmented reality