identitytheftcybercrimefraudcyberbullyingmonitorfirewallmalwareinternetsafetyspywarelaptopmousevirusspoofingpharminggraphicscardhackerhoaxphishingcomputerspamdownloadingcomputerclickjackingTrojanHorseharddriveidentitytheftcybercrimefraudcyberbullyingmonitorfirewallmalwareinternetsafetyspywarelaptopmousevirusspoofingpharminggraphicscardhackerhoaxphishingcomputerspamdownloadingcomputerclickjackingTrojanHorseharddrive

Tech - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. identity theft
  2. cybercrime
  3. fraud
  4. cyberbullying
  5. monitor
  6. firewall
  7. malware
  8. internet safety
  9. spyware
  10. laptop
  11. mouse
  12. virus
  13. spoofing
  14. pharming
  15. graphics card
  16. hacker
  17. hoax
  18. phishing
  19. computer
  20. spam
  21. downloading
  22. computer
  23. clickjacking
  24. Trojan Horse
  25. hard drive