emailspoofingspamcomputervirususernameidentitytheftcookiesfirewallspoofingspywareencryptionbackupwormpasswordadwaresurgeprotectorcyberterroristquarantinetrojanhorsecybercrimeergonomicsphishingbackdoorhackerantivirusprogramemailspoofingspamcomputervirususernameidentitytheftcookiesfirewallspoofingspywareencryptionbackupwormpasswordadwaresurgeprotectorcyberterroristquarantinetrojanhorsecybercrimeergonomicsphishingbackdoorhackerantivirusprogram

Internet Threats & Safety - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. email spoofing
  2. spam
  3. computer virus
  4. username
  5. identity theft
  6. cookies
  7. firewall
  8. spoofing
  9. spyware
  10. encryption
  11. backup
  12. worm
  13. password
  14. adware
  15. surge protector
  16. cyberterrorist
  17. quarantine
  18. trojan horse
  19. cybercrime
  20. ergonomics
  21. phishing
  22. back door
  23. hacker
  24. antivirus program