EvidenceOpinionHarassmentVloggerOnlinePrivacyContextMuteSourceExperitiseCurateCatfishingSkepticalInterpretFrameSettingSprearphishingContextPasswordBystanderFactSearchresultsTwo-StepverificationMotiveQueryPrivacyDisinformationRepresentationTargetSecurityConflictClickbaitScamHarassmentAggressorEmpathyAssumptionHackerDeceptiveCredibleSearchengineBullyingPersonalinformationReputationCyberbullyingSmishingOversharingPhishingMediaMaliciousKeywordCaptionBlockRefusalskillsMisinformationDigitalFootprintTrustTrustworthyCourageousCodeEvidenceOpinionHarassmentVloggerOnlinePrivacyContextMuteSourceExperitiseCurateCatfishingSkepticalInterpretFrameSettingSprearphishingContextPasswordBystanderFactSearchresultsTwo-StepverificationMotiveQueryPrivacyDisinformationRepresentationTargetSecurityConflictClickbaitScamHarassmentAggressorEmpathyAssumptionHackerDeceptiveCredibleSearchengineBullyingPersonalinformationReputationCyberbullyingSmishingOversharingPhishingMediaMaliciousKeywordCaptionBlockRefusalskillsMisinformationDigitalFootprintTrustTrustworthyCourageousCode

Internet Safety - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
  1. Evidence
  2. Opinion
  3. Harassment
  4. Vlogger
  5. Online Privacy
  6. Context
  7. Mute
  8. Source
  9. Experitise
  10. Curate
  11. Catfishing
  12. Skeptical
  13. Interpret
  14. Frame
  15. Setting
  16. Sprearphishing
  17. Context
  18. Password
  19. Bystander
  20. Fact
  21. Search results
  22. Two-Step verification
  23. Motive
  24. Query
  25. Privacy
  26. Disinformation
  27. Representation
  28. Target
  29. Security
  30. Conflict
  31. Clickbait
  32. Scam
  33. Harassment
  34. Aggressor
  35. Empathy
  36. Assumption
  37. Hacker
  38. Deceptive
  39. Credible
  40. Search engine
  41. Bullying
  42. Personal information
  43. Reputation
  44. Cyberbullying
  45. Smishing
  46. Oversharing
  47. Phishing
  48. Media
  49. Malicious
  50. Keyword
  51. Caption
  52. Block
  53. Refusal skills
  54. Misinformation
  55. Digital Footprint
  56. Trust
  57. Trustworthy
  58. Courageous
  59. Code