RefusalskillsMediaScamHarassmentSmishingFrameMuteCatfishingReputationCurateConflictSourceSettingCyberbullyingOpinionDigitalFootprintClickbaitMisinformationInterpretBystanderPrivacyHackerAggressorMaliciousDeceptiveEvidenceHarassmentDisinformationVloggerContextContextOnlinePrivacyPasswordSearchengineEmpathyCourageousSecurityCodeTrustAssumptionTrustworthyCaptionSearchresultsPhishingBullyingTwo-StepverificationKeywordRepresentationQueryTargetBlockOversharingSkepticalPersonalinformationCredibleMotiveExperitiseSprearphishingFactRefusalskillsMediaScamHarassmentSmishingFrameMuteCatfishingReputationCurateConflictSourceSettingCyberbullyingOpinionDigitalFootprintClickbaitMisinformationInterpretBystanderPrivacyHackerAggressorMaliciousDeceptiveEvidenceHarassmentDisinformationVloggerContextContextOnlinePrivacyPasswordSearchengineEmpathyCourageousSecurityCodeTrustAssumptionTrustworthyCaptionSearchresultsPhishingBullyingTwo-StepverificationKeywordRepresentationQueryTargetBlockOversharingSkepticalPersonalinformationCredibleMotiveExperitiseSprearphishingFact

Internet Safety - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
  1. Refusal skills
  2. Media
  3. Scam
  4. Harassment
  5. Smishing
  6. Frame
  7. Mute
  8. Catfishing
  9. Reputation
  10. Curate
  11. Conflict
  12. Source
  13. Setting
  14. Cyberbullying
  15. Opinion
  16. Digital Footprint
  17. Clickbait
  18. Misinformation
  19. Interpret
  20. Bystander
  21. Privacy
  22. Hacker
  23. Aggressor
  24. Malicious
  25. Deceptive
  26. Evidence
  27. Harassment
  28. Disinformation
  29. Vlogger
  30. Context
  31. Context
  32. Online Privacy
  33. Password
  34. Search engine
  35. Empathy
  36. Courageous
  37. Security
  38. Code
  39. Trust
  40. Assumption
  41. Trustworthy
  42. Caption
  43. Search results
  44. Phishing
  45. Bullying
  46. Two-Step verification
  47. Keyword
  48. Representation
  49. Query
  50. Target
  51. Block
  52. Oversharing
  53. Skeptical
  54. Personal information
  55. Credible
  56. Motive
  57. Experitise
  58. Sprearphishing
  59. Fact