analytics algorithms data metrics cybersecurity consent Rabbit data monitoring data catalog data governance Data data masking data culture descriptive analytics security data reporting anonymization data warehouse data retention data modeling data architecture compliance Dragon data access data sharing data pipeline machine learning data visualization data lifecycle KPIs data mining Snake data protection insights data stewardship data strategy big data privacy data integration dashboard data ownership GDPR encryption data lake data management prescriptive analytics predictive analytics Free! data breach data integrity Elephant data quality transparency data audit data policy data science data transformation data- driven data flow data ethics accountability data literacy analytics algorithms data metrics cybersecurity consent Rabbit data monitoring data catalog data governance Data data masking data culture descriptive analytics security data reporting anonymization data warehouse data retention data modeling data architecture compliance Dragon data access data sharing data pipeline machine learning data visualization data lifecycle KPIs data mining Snake data protection insights data stewardship data strategy big data privacy data integration dashboard data ownership GDPR encryption data lake data management prescriptive analytics predictive analytics Free! data breach data integrity Elephant data quality transparency data audit data policy data science data transformation data- driven data flow data ethics accountability data literacy
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
analytics
algorithms
data metrics
cybersecurity
consent
Rabbit
data monitoring
data catalog
data governance
Data
data masking
data culture
descriptive analytics
security
data reporting
anonymization
data warehouse
data retention
data modeling
data architecture
compliance
Dragon
data access
data sharing
data pipeline
machine learning
data visualization
data lifecycle
KPIs
data mining
Snake
data protection
insights
data stewardship
data strategy
big data
privacy
data integration
dashboard
data ownership
GDPR
encryption
data lake
data management
prescriptive analytics
predictive analytics
Free!
data breach
data integrity
Elephant
data quality
transparency
data audit
data policy
data science
data transformation
data-driven
data flow
data ethics
accountability
data literacy