hackerergonomicsantivirusprogramidentitytheftspoofingencryptioncybercrimespamcyberterroristsurgeprotectorusernamebackupwormspywarepasswordphishingemailspoofingquarantinetrojanhorsefirewallbackdooradwarecomputerviruscookieshackerergonomicsantivirusprogramidentitytheftspoofingencryptioncybercrimespamcyberterroristsurgeprotectorusernamebackupwormspywarepasswordphishingemailspoofingquarantinetrojanhorsefirewallbackdooradwarecomputerviruscookies

Internet Threats & Safety - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. hacker
  2. ergonomics
  3. antivirus program
  4. identity theft
  5. spoofing
  6. encryption
  7. cybercrime
  8. spam
  9. cyberterrorist
  10. surge protector
  11. username
  12. backup
  13. worm
  14. spyware
  15. password
  16. phishing
  17. email spoofing
  18. quarantine
  19. trojan horse
  20. firewall
  21. back door
  22. adware
  23. computer virus
  24. cookies