insiderattacktrademarkderivativeworklicensecopyrightactiveattackransomwareadwareattributionpublicdomainmalwareoriginalworkhackerphishing firewallcybercrimesmishingfairuseplagiarismtrojanintellectualpropertyvirusworkfor hirestockworkinsiderattacktrademarkderivativeworklicensecopyrightactiveattackransomwareadwareattributionpublicdomainmalwareoriginalworkhackerphishing firewallcybercrimesmishingfairuseplagiarismtrojanintellectualpropertyvirusworkfor hirestockwork

Technology Safety and Ethics - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. insider attack
  2. trademark
  3. derivative work
  4. license
  5. copyright
  6. active attack
  7. ransomware
  8. adware
  9. attribution
  10. public domain
  11. malware
  12. original work
  13. hacker
  14. phishing
  15. firewall
  16. cybercrime
  17. smishing
  18. fair use
  19. plagiarism
  20. trojan
  21. intellectual property
  22. virus
  23. work for hire
  24. stock work