hackeroriginalworktrademarkplagiarismpublicdomainworkfor hireactiveattackvirusadwaretrojancybercrimestockworkphishing smishinginsiderattackfairusederivativeworkintellectualpropertylicensemalwarecopyrightattributionransomwarefirewallhackeroriginalworktrademarkplagiarismpublicdomainworkfor hireactiveattackvirusadwaretrojancybercrimestockworkphishing smishinginsiderattackfairusederivativeworkintellectualpropertylicensemalwarecopyrightattributionransomwarefirewall

Technology Safety and Ethics - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. hacker
  2. original work
  3. trademark
  4. plagiarism
  5. public domain
  6. work for hire
  7. active attack
  8. virus
  9. adware
  10. trojan
  11. cybercrime
  12. stock work
  13. phishing
  14. smishing
  15. insider attack
  16. fair use
  17. derivative work
  18. intellectual property
  19. license
  20. malware
  21. copyright
  22. attribution
  23. ransomware
  24. firewall