virusactiveattackintellectualpropertytrojanpublicdomainfirewallphishing workfor hirelicensestockworkhackerinsiderattackadwarecybercrimecopyrightplagiarismtrademarkoriginalworkmalwareattributionfairusesmishingderivativeworkransomwarevirusactiveattackintellectualpropertytrojanpublicdomainfirewallphishing workfor hirelicensestockworkhackerinsiderattackadwarecybercrimecopyrightplagiarismtrademarkoriginalworkmalwareattributionfairusesmishingderivativeworkransomware

Technology Safety and Ethics - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. virus
  2. active attack
  3. intellectual property
  4. trojan
  5. public domain
  6. firewall
  7. phishing
  8. work for hire
  9. license
  10. stock work
  11. hacker
  12. insider attack
  13. adware
  14. cybercrime
  15. copyright
  16. plagiarism
  17. trademark
  18. original work
  19. malware
  20. attribution
  21. fair use
  22. smishing
  23. derivative work
  24. ransomware