(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Snapchat users were told that they would be notified if _____________
Up until ______ users could connect their mobile device to a computer and users could connect their mobile device to a computer and use file browsing tools to locate and save video files sent to them.
In 2006 The __________________ was passed.
A FaceBook employee is notified if relationship ________ and phrase material add up
Bitmoji is an app that requires users to __________________.
Lawmakers want to make it so the ______ can only request a warrant for the data from specific persons of interest rather than everyone in general.
In 2013, after interviewing for a job, one man had full, _________ access to all customer data for the full day
If someone had an Apple device with an operating system older than _____, they could take a screenshot and the sender would not get an alert.
Free!
Clear Channel partnered with ______ phone company to collect and analyze the data
Uber has examined __________ of reporters who could write critically about the company.
Each day millions of Americans have _______________ and they may not even be aware of it.
The new consumer tracking technology used by Clear Channel Outdoor Americas is called _________.
Snapchat is subject to ________________ for the next 20 years
Wells Fargo ________ calls without notifying customers first
Snapchat is advertised as a _______________
Give an example of some of the data Starbucks collects when you are on their WiFi
Information surrounding a call is called __________
Article ___ in the UDHR covers privacy rights
Article ___ in the UDHR covers privacy rights
__________________ is an act that gives law enforcement and intelligence authorities the permission to look into people's phone, email and internet records for information if they suspect a terrorist attack.
Uber tracks users in real time using _____________.
Government began to secretly collect metadata in ______.
__ Newtown students were arrested for their involvement in the sexting scandal
Full access allows the developer to _______________.