Unauthorized access To protect your computer from malware cybersecurity Privacy challenge unauthorized access hacker protect systems and data sensitive information. social engineering strong passwords Digital security software sensitive data antivirus Network systems ethical guidelines A combination of letters, numbers, and symbols Business operations malware Respecting others' privacy innovative hacker Public parks Phishing Unauthorized access To protect your computer from malware cybersecurity Privacy challenge unauthorized access hacker protect systems and data sensitive information. social engineering strong passwords Digital security software sensitive data antivirus Network systems ethical guidelines A combination of letters, numbers, and symbols Business operations malware Respecting others' privacy innovative hacker Public parks Phishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Unauthorized access
To protect your computer from malware
cybersecurity
Privacy
challenge
unauthorized access
hacker
protect systems and data
sensitive information.
social engineering
strong passwords
Digital security
software
sensitive data
antivirus
Network systems
ethical guidelines
A combination of letters, numbers, and symbols
Business operations
malware
Respecting others' privacy
innovative hacker
Public parks
Phishing