surgeprotectorusernamecookiesphishingbackdoorbackupcomputerviruspasswordwormtrojanhorseergonomicsemailspoofingspamcybercrimecyberterroristfirewallidentitythefthackerspoofingquarantineadwareencryptionantivirusprogramspywaresurgeprotectorusernamecookiesphishingbackdoorbackupcomputerviruspasswordwormtrojanhorseergonomicsemailspoofingspamcybercrimecyberterroristfirewallidentitythefthackerspoofingquarantineadwareencryptionantivirusprogramspyware

Internet Threats & Safety - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. surge protector
  2. username
  3. cookies
  4. phishing
  5. back door
  6. backup
  7. computer virus
  8. password
  9. worm
  10. trojan horse
  11. ergonomics
  12. email spoofing
  13. spam
  14. cybercrime
  15. cyberterrorist
  16. firewall
  17. identity theft
  18. hacker
  19. spoofing
  20. quarantine
  21. adware
  22. encryption
  23. antivirus program
  24. spyware