(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
When private information is accidentally exposed or stolen
Data leak
The process of converting data into a secret code to protect it.
Encryption
Protected from threats or unauthorized access.
Secure
A digital ledger that is secure and shared across multiple users.
Blockchain
A new version of software that improves security or performance.
Update
Login information like usernames and passwords.
Credentials
A person who breaks into computer systems, often illegally
Hacker
Malicious software designed to harm or steal data from a computer
Malware
An attempt to damage or access a computer system or network.
Cyberattack
A copy of data saved in case the original is lost or damaged
Backup
A scam where fake emails or messages trick people into giving personal info
Phishing
A unique number that identifies a device on a network.
IP address
Unwanted or junk emails
Spam
A small file stored on your browser that tracks website activity
Cookie
Laws that govern online behavior and digital rights.
Cyberlaw
Software that secretly collects information from your device.
Spyware