Untitled Bingo

Untitled Bingo Card
Preview

This bingo card has a free space and 24 words: Define Phishing, Give an example of a secure computer password, Email PA Security, Define Computer Virus, Be caught by security properly wearing ID badge, Participate in Doc. Lunch", Answer Security Question, Name a famous cyber security spy, Participate in "Cyber Movie Montage", Report a suspicious email, Read Cyber Security DSS Pamphlet, Provide input for future security training, Complete Crossword Puzzle, Report a security violation, Define Phishing, Show your social media account is privacy protected, Ask FSO a cyber security related question, Name a cyber security threat, Participate in "Caption This", Show phone security with locked screen, Answer security question, Name a cyber security threat, Define computer virus and Provide input for future security training.

⚠ This card has duplicate items: Define Phishing (2), Provide input for future security training (2), Name a cyber security threat (2)

More like this:

AAC Cybersecurity Week | Cybersecurity Scavenger Hunt | Topic 16: Equipment Basics | ICT Bingo - Keren Class | CPNI Bingo

Play Online

Share this URL with your players:

For more control of your online game, create a clone of this card first.

Learn how to conduct a bingo game.

Call List

Probabilities

With players vying for a you'll have to call about __ items before someone wins. There's a __% chance that a lucky player would win after calling __ items.

Tip: If you want your game to last longer (on average), add more unique words/images to it.