firewallergonomicsusernamepasswordphishinghackerbackupwormcybercrimespamcookiesencryptionemailspoofingtrojanhorsesurgeprotectorspywarequarantineantivirusprogramspoofingcomputervirusbackdoorcyberterroristadwareidentitytheftfirewallergonomicsusernamepasswordphishinghackerbackupwormcybercrimespamcookiesencryptionemailspoofingtrojanhorsesurgeprotectorspywarequarantineantivirusprogramspoofingcomputervirusbackdoorcyberterroristadwareidentitytheft

Internet Threats & Safety - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. firewall
  2. ergonomics
  3. username
  4. password
  5. phishing
  6. hacker
  7. backup
  8. worm
  9. cybercrime
  10. spam
  11. cookies
  12. encryption
  13. email spoofing
  14. trojan horse
  15. surge protector
  16. spyware
  17. quarantine
  18. antivirus program
  19. spoofing
  20. computer virus
  21. back door
  22. cyberterrorist
  23. adware
  24. identity theft