Loves reading books Has a cybersecurity- themed wardrobe Wears a hoodie while coding Has multiple certifications Loves debugging more than coding Enjoys hiking Reads cybersecurity blogs Uses a webcam cover Uses multi- factor authentication Is a morning person Is a fitness enthusiast Enjoys coding Has a secret stash of snacks Uses a password manager religiously Has a favorite cybersecurity catchphrase Has run a marathon Uses a VPN Loves coffee Plays a musical instrument Has a coding- themed wardrobe Uses secure coding practices Participates in CTFs Educates others on security Has traveled to more than 5 countries Loves reading books Has a cybersecurity- themed wardrobe Wears a hoodie while coding Has multiple certifications Loves debugging more than coding Enjoys hiking Reads cybersecurity blogs Uses a webcam cover Uses multi- factor authentication Is a morning person Is a fitness enthusiast Enjoys coding Has a secret stash of snacks Uses a password manager religiously Has a favorite cybersecurity catchphrase Has run a marathon Uses a VPN Loves coffee Plays a musical instrument Has a coding- themed wardrobe Uses secure coding practices Participates in CTFs Educates others on security Has traveled to more than 5 countries
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Loves reading books
Has a cybersecurity-themed wardrobe
Wears a hoodie while coding
Has multiple certifications
Loves debugging more than coding
Enjoys hiking
Reads cybersecurity blogs
Uses a webcam cover
Uses multi-factor authentication
Is a morning person
Is a fitness enthusiast
Enjoys coding
Has a secret stash of snacks
Uses a password manager religiously
Has a favorite cybersecurity catchphrase
Has run a marathon
Uses a VPN
Loves coffee
Plays a musical instrument
Has a coding-themed wardrobe
Uses secure coding practices
Participates in CTFs
Educates others on security
Has traveled to more than 5 countries