SecurityFactSkepticalBlockContextFrameVloggerAggressorHackerTargetMisinformationInterpretPersonalinformationCodeBystanderCaptionQuerySettingTrustworthyCourageousPasswordHarassmentExperitiseMaliciousEmpathyRepresentationCatfishingSmishingScamSprearphishingDisinformationMediaPhishingRefusalskillsPrivacyContextBullyingSearchengineClickbaitOnlinePrivacyCredibleTrustOversharingDeceptiveKeywordSourceReputationTwo-StepverificationAssumptionEvidenceConflictMuteCyberbullyingSearchresultsCurateHarassmentOpinionDigitalFootprintMotiveSecurityFactSkepticalBlockContextFrameVloggerAggressorHackerTargetMisinformationInterpretPersonalinformationCodeBystanderCaptionQuerySettingTrustworthyCourageousPasswordHarassmentExperitiseMaliciousEmpathyRepresentationCatfishingSmishingScamSprearphishingDisinformationMediaPhishingRefusalskillsPrivacyContextBullyingSearchengineClickbaitOnlinePrivacyCredibleTrustOversharingDeceptiveKeywordSourceReputationTwo-StepverificationAssumptionEvidenceConflictMuteCyberbullyingSearchresultsCurateHarassmentOpinionDigitalFootprintMotive

Internet Safety - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
  1. Security
  2. Fact
  3. Skeptical
  4. Block
  5. Context
  6. Frame
  7. Vlogger
  8. Aggressor
  9. Hacker
  10. Target
  11. Misinformation
  12. Interpret
  13. Personal information
  14. Code
  15. Bystander
  16. Caption
  17. Query
  18. Setting
  19. Trustworthy
  20. Courageous
  21. Password
  22. Harassment
  23. Experitise
  24. Malicious
  25. Empathy
  26. Representation
  27. Catfishing
  28. Smishing
  29. Scam
  30. Sprearphishing
  31. Disinformation
  32. Media
  33. Phishing
  34. Refusal skills
  35. Privacy
  36. Context
  37. Bullying
  38. Search engine
  39. Clickbait
  40. Online Privacy
  41. Credible
  42. Trust
  43. Oversharing
  44. Deceptive
  45. Keyword
  46. Source
  47. Reputation
  48. Two-Step verification
  49. Assumption
  50. Evidence
  51. Conflict
  52. Mute
  53. Cyberbullying
  54. Search results
  55. Curate
  56. Harassment
  57. Opinion
  58. Digital Footprint
  59. Motive