Phishing Courageous Assumption Code Representation Bullying Credible Source Trustworthy Scam Conflict Interpret Skeptical Privacy Personal information Oversharing Misinformation Deceptive Fact Setting Reputation Target Disinformation Context Search results Empathy Cyberbullying Harassment Catfishing Curate Harassment Experitise Malicious Hacker Media Caption Opinion Search engine Two-Step verification Trust Security Clickbait Vlogger Digital Footprint Frame Context Refusal skills Sprearphishing Keyword Query Aggressor Motive Bystander Mute Smishing Evidence Block Password Online Privacy Phishing Courageous Assumption Code Representation Bullying Credible Source Trustworthy Scam Conflict Interpret Skeptical Privacy Personal information Oversharing Misinformation Deceptive Fact Setting Reputation Target Disinformation Context Search results Empathy Cyberbullying Harassment Catfishing Curate Harassment Experitise Malicious Hacker Media Caption Opinion Search engine Two-Step verification Trust Security Clickbait Vlogger Digital Footprint Frame Context Refusal skills Sprearphishing Keyword Query Aggressor Motive Bystander Mute Smishing Evidence Block Password Online Privacy
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Phishing
Courageous
Assumption
Code
Representation
Bullying
Credible
Source
Trustworthy
Scam
Conflict
Interpret
Skeptical
Privacy
Personal information
Oversharing
Misinformation
Deceptive
Fact
Setting
Reputation
Target
Disinformation
Context
Search results
Empathy
Cyberbullying
Harassment
Catfishing
Curate
Harassment
Experitise
Malicious
Hacker
Media
Caption
Opinion
Search engine
Two-Step verification
Trust
Security
Clickbait
Vlogger
Digital Footprint
Frame
Context
Refusal skills
Sprearphishing
Keyword
Query
Aggressor
Motive
Bystander
Mute
Smishing
Evidence
Block
Password
Online Privacy