trademarkvirusinsiderattacksmishingintellectualpropertyactiveattackfirewallpublicdomainderivativeworkadwareworkfor hiremalwarelicenseattributioncybercrimeoriginalworkfairusecopyrightplagiarismhackerransomwarephishing stockworktrojantrademarkvirusinsiderattacksmishingintellectualpropertyactiveattackfirewallpublicdomainderivativeworkadwareworkfor hiremalwarelicenseattributioncybercrimeoriginalworkfairusecopyrightplagiarismhackerransomwarephishing stockworktrojan

Technology Safety and Ethics - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. trademark
  2. virus
  3. insider attack
  4. smishing
  5. intellectual property
  6. active attack
  7. firewall
  8. public domain
  9. derivative work
  10. adware
  11. work for hire
  12. malware
  13. license
  14. attribution
  15. cybercrime
  16. original work
  17. fair use
  18. copyright
  19. plagiarism
  20. hacker
  21. ransomware
  22. phishing
  23. stock work
  24. trojan