hackerquarantinecybercrimewormantivirusprogramidentitythefttrojanhorsepasswordbackupsurgeprotectorencryptioncookiescyberterroristspoofingadwareusernamespywarecomputervirusemailspoofingbackdoorfirewallphishingspamergonomicshackerquarantinecybercrimewormantivirusprogramidentitythefttrojanhorsepasswordbackupsurgeprotectorencryptioncookiescyberterroristspoofingadwareusernamespywarecomputervirusemailspoofingbackdoorfirewallphishingspamergonomics

Internet Threats & Safety - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. hacker
  2. quarantine
  3. cybercrime
  4. worm
  5. antivirus program
  6. identity theft
  7. trojan horse
  8. password
  9. backup
  10. surge protector
  11. encryption
  12. cookies
  13. cyberterrorist
  14. spoofing
  15. adware
  16. username
  17. spyware
  18. computer virus
  19. email spoofing
  20. back door
  21. firewall
  22. phishing
  23. spam
  24. ergonomics