wormcookiescomputervirusspywareemailspoofingspoofingspamfirewallsurgeprotectorbackdoorquarantineergonomicscyberterroristadwarepasswordencryptionhackerusernamebackupidentitytheftphishingantivirusprogramcybercrimetrojanhorsewormcookiescomputervirusspywareemailspoofingspoofingspamfirewallsurgeprotectorbackdoorquarantineergonomicscyberterroristadwarepasswordencryptionhackerusernamebackupidentitytheftphishingantivirusprogramcybercrimetrojanhorse

Internet Threats & Safety - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. worm
  2. cookies
  3. computer virus
  4. spyware
  5. email spoofing
  6. spoofing
  7. spam
  8. firewall
  9. surge protector
  10. back door
  11. quarantine
  12. ergonomics
  13. cyberterrorist
  14. adware
  15. password
  16. encryption
  17. hacker
  18. username
  19. backup
  20. identity theft
  21. phishing
  22. antivirus program
  23. cybercrime
  24. trojan horse