PhishingCourageousAssumptionCodeRepresentationBullyingCredibleSourceTrustworthyScamConflictInterpretSkepticalPrivacyPersonalinformationOversharingMisinformationDeceptiveFactSettingReputationTargetDisinformationContextSearchresultsEmpathyCyberbullyingHarassmentCatfishingCurateHarassmentExperitiseMaliciousHackerMediaCaptionOpinionSearchengineTwo-StepverificationTrustSecurityClickbaitVloggerDigitalFootprintFrameContextRefusalskillsSprearphishingKeywordQueryAggressorMotiveBystanderMuteSmishingEvidenceBlockPasswordOnlinePrivacyPhishingCourageousAssumptionCodeRepresentationBullyingCredibleSourceTrustworthyScamConflictInterpretSkepticalPrivacyPersonalinformationOversharingMisinformationDeceptiveFactSettingReputationTargetDisinformationContextSearchresultsEmpathyCyberbullyingHarassmentCatfishingCurateHarassmentExperitiseMaliciousHackerMediaCaptionOpinionSearchengineTwo-StepverificationTrustSecurityClickbaitVloggerDigitalFootprintFrameContextRefusalskillsSprearphishingKeywordQueryAggressorMotiveBystanderMuteSmishingEvidenceBlockPasswordOnlinePrivacy

Internet Safety - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
  1. Phishing
  2. Courageous
  3. Assumption
  4. Code
  5. Representation
  6. Bullying
  7. Credible
  8. Source
  9. Trustworthy
  10. Scam
  11. Conflict
  12. Interpret
  13. Skeptical
  14. Privacy
  15. Personal information
  16. Oversharing
  17. Misinformation
  18. Deceptive
  19. Fact
  20. Setting
  21. Reputation
  22. Target
  23. Disinformation
  24. Context
  25. Search results
  26. Empathy
  27. Cyberbullying
  28. Harassment
  29. Catfishing
  30. Curate
  31. Harassment
  32. Experitise
  33. Malicious
  34. Hacker
  35. Media
  36. Caption
  37. Opinion
  38. Search engine
  39. Two-Step verification
  40. Trust
  41. Security
  42. Clickbait
  43. Vlogger
  44. Digital Footprint
  45. Frame
  46. Context
  47. Refusal skills
  48. Sprearphishing
  49. Keyword
  50. Query
  51. Aggressor
  52. Motive
  53. Bystander
  54. Mute
  55. Smishing
  56. Evidence
  57. Block
  58. Password
  59. Online Privacy