activeattackmalwareworkfor hireattributioncopyrightfairuseintellectualpropertyvirusoriginalworksmishingcybercrimephishing stockworkadwarederivativeworkransomwarehackerlicensefirewallplagiarisminsiderattacktrojanpublicdomaintrademarkactiveattackmalwareworkfor hireattributioncopyrightfairuseintellectualpropertyvirusoriginalworksmishingcybercrimephishing stockworkadwarederivativeworkransomwarehackerlicensefirewallplagiarisminsiderattacktrojanpublicdomaintrademark

Technology Safety and Ethics - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. active attack
  2. malware
  3. work for hire
  4. attribution
  5. copyright
  6. fair use
  7. intellectual property
  8. virus
  9. original work
  10. smishing
  11. cybercrime
  12. phishing
  13. stock work
  14. adware
  15. derivative work
  16. ransomware
  17. hacker
  18. license
  19. firewall
  20. plagiarism
  21. insider attack
  22. trojan
  23. public domain
  24. trademark