Is a morning person Has a secret stash of snacks Has a favorite cybersecurity catchphrase Wears a hoodie while coding Plays a musical instrument Educates others on security Uses multi- factor authentication Uses secure coding practices Participates in CTFs Has traveled to more than 5 countries Loves coffee Enjoys hiking Has a cybersecurity- themed wardrobe Has a coding- themed wardrobe Has multiple certifications Has run a marathon Uses a webcam cover Is a fitness enthusiast Loves debugging more than coding Enjoys coding Reads cybersecurity blogs Uses a VPN Uses a password manager religiously Loves reading books Is a morning person Has a secret stash of snacks Has a favorite cybersecurity catchphrase Wears a hoodie while coding Plays a musical instrument Educates others on security Uses multi- factor authentication Uses secure coding practices Participates in CTFs Has traveled to more than 5 countries Loves coffee Enjoys hiking Has a cybersecurity- themed wardrobe Has a coding- themed wardrobe Has multiple certifications Has run a marathon Uses a webcam cover Is a fitness enthusiast Loves debugging more than coding Enjoys coding Reads cybersecurity blogs Uses a VPN Uses a password manager religiously Loves reading books
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Is a morning person
Has a secret stash of snacks
Has a favorite cybersecurity catchphrase
Wears a hoodie while coding
Plays a musical instrument
Educates others on security
Uses multi-factor authentication
Uses secure coding practices
Participates in CTFs
Has traveled to more than 5 countries
Loves coffee
Enjoys hiking
Has a cybersecurity-themed wardrobe
Has a coding-themed wardrobe
Has multiple certifications
Has run a marathon
Uses a webcam cover
Is a fitness enthusiast
Loves debugging more than coding
Enjoys coding
Reads cybersecurity blogs
Uses a VPN
Uses a password manager religiously
Loves reading books