This bingo card has a free space and 59 words: INTELLECTUAL PROPERTY, COPY RIGHT, PLAGIARISM, SOFTWARE PIRACY, INTERNET PIRACY, END USER PIRACY, COUNTERFEITING, DMCA DIGITAL MILLENIUM COPYRIGHT ACT, HACKERS, CRACKERS, COMPUTER CRIME, THEFT, UNAUTHORIZED ACCESS, DATA THEFT, CREATING MALWARE, POP-UP WINDOWS, CRASHING OF THE DEVICE, NETWORK VIRUS, FILE INFECTOR, USER ERROR, HARDWARE FAILURES, CYBERSECURITY THREATS, INSIDER THREATS, DATA BREACHES AND PRIVACY VIOLATION, INTELLECTUAL PROPERTY, COPY RIGHT, PLAGIARISM, SOFTWARE PIRACY, INTERNET PIRACY, END USER PIRACY, COUNTERFEITING, DMCA DIGITAL MILLENIUM COPYRIGHT ACT, HACKERS, CRACKERS, COMPUTER CRIME, THEFT, UNAUTHORIZED ACCESS, DATA THEFT, CREATING MALWARE, POP-UP WINDOWS, CRASHING OF THE DEVICE, NETWORK VIRUS, FILE INFECTOR, USER ERROR, HARDWARE FAILURES, CYBERSECURITY THREATS, INSIDER THREATS, DATA BREACHES AND PRIVACY VIOLATION, CONTRACTUAL LIABILITIES, PRIVACY LIABILITIES, ENVIRONMENTAL LIABILITIES, EMPLOYEE LIABILITIES, TRADE SECRET, CLIENT-SERVER OVERUSE, FAIR USE, CLICK FRAUD, SCAM, WIRETAPPING and SPEED OF SYSTEM.
⚠ This card has duplicate items: INTELLECTUAL PROPERTY (2), COPY RIGHT (2), PLAGIARISM (2), SOFTWARE PIRACY (2), INTERNET PIRACY (2), COUNTERFEITING (2), DMCA DIGITAL MILLENIUM COPYRIGHT ACT (2), HACKERS (2), CRACKERS (2), COMPUTER CRIME (2), THEFT (2), UNAUTHORIZED ACCESS (2), POP-UP WINDOWS (2), USER ERROR (2), HARDWARE FAILURES (2), DATA BREACHES AND PRIVACY VIOLATION (2)
CYBERSECURITY THREATS | CYBERSECURITY THREATS | CYBERSECURITY THREATS | CYBERSECURITY THREATS | ESCEI Bingo
Share this URL with your players:
For more control of your online game, create a clone of this card first.
Learn how to conduct a bingo game.
With players vying for a you'll have to call about __ items before someone wins. There's a __% chance that a lucky player would win after calling __ items.
Tip: If you want your game to last longer (on average), add more unique words/images to it.