software hacker Public parks A combination of letters, numbers, and symbols cybersecurity Privacy innovative hacker Unauthorized access social engineering unauthorized access strong passwords To protect your computer from malware sensitive data Business operations Network systems sensitive information. ethical guidelines challenge protect systems and data antivirus malware Respecting others' privacy Digital security Phishing software hacker Public parks A combination of letters, numbers, and symbols cybersecurity Privacy innovative hacker Unauthorized access social engineering unauthorized access strong passwords To protect your computer from malware sensitive data Business operations Network systems sensitive information. ethical guidelines challenge protect systems and data antivirus malware Respecting others' privacy Digital security Phishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
software
hacker
Public parks
A combination of letters, numbers, and symbols
cybersecurity
Privacy
innovative hacker
Unauthorized access
social engineering
unauthorized access
strong passwords
To protect your computer from malware
sensitive data
Business operations
Network systems
sensitive information.
ethical guidelines
challenge
protect systems and data
antivirus
malware
Respecting others' privacy
Digital security
Phishing