trojanattributionfairusevirusoriginalworkhackerpublicdomainintellectualpropertycybercrimesmishingphishing stockworkworkfor hirefirewallplagiarismactiveattackmalwarelicenseransomwarederivativeworkcopyrightinsiderattacktrademarkadwaretrojanattributionfairusevirusoriginalworkhackerpublicdomainintellectualpropertycybercrimesmishingphishing stockworkworkfor hirefirewallplagiarismactiveattackmalwarelicenseransomwarederivativeworkcopyrightinsiderattacktrademarkadware

Technology Safety and Ethics - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. trojan
  2. attribution
  3. fair use
  4. virus
  5. original work
  6. hacker
  7. public domain
  8. intellectual property
  9. cybercrime
  10. smishing
  11. phishing
  12. stock work
  13. work for hire
  14. firewall
  15. plagiarism
  16. active attack
  17. malware
  18. license
  19. ransomware
  20. derivative work
  21. copyright
  22. insider attack
  23. trademark
  24. adware