SCREEN TIME 68% AGEISM IDENTITY THEFT PROTECTION FREEDOM OF SPEECH 59- 77 TECHNOLOGY DEPENDENCY ELECTRONIC COMMUNICATIONS PRIVACY ACT APPLE 1997 MODERNIZING THE WORKFORCE PROS AND CONS OF TECHNOLOGY GENERATIONAL CHANGES HACKING AND CYBER SECURITY CYBER BULLYING AND FREEDOM OF SPEECH BOUNDARIES SOCIAL MEDIA THE PRIVACY ACT OF 1974 DIGITAL DIVIDE GENERATION X PRIVACY PLAGIARISM COVID PHISHING EMAILS SCREEN TIME 68% AGEISM IDENTITY THEFT PROTECTION FREEDOM OF SPEECH 59- 77 TECHNOLOGY DEPENDENCY ELECTRONIC COMMUNICATIONS PRIVACY ACT APPLE 1997 MODERNIZING THE WORKFORCE PROS AND CONS OF TECHNOLOGY GENERATIONAL CHANGES HACKING AND CYBER SECURITY CYBER BULLYING AND FREEDOM OF SPEECH BOUNDARIES SOCIAL MEDIA THE PRIVACY ACT OF 1974 DIGITAL DIVIDE GENERATION X PRIVACY PLAGIARISM COVID PHISHING EMAILS
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
SCREEN TIME
68%
AGEISM
IDENTITY THEFT PROTECTION
FREEDOM OF SPEECH
59-77
TECHNOLOGY DEPENDENCY
ELECTRONIC COMMUNICATIONS PRIVACY ACT
APPLE
1997
MODERNIZING THE WORKFORCE
PROS AND CONS OF TECHNOLOGY
GENERATIONAL CHANGES
HACKING AND CYBER SECURITY
CYBER BULLYING AND FREEDOM OF SPEECH
BOUNDARIES
SOCIAL MEDIA
THE PRIVACY ACT OF 1974
DIGITAL DIVIDE
GENERATION X
PRIVACY
PLAGIARISM
COVID
PHISHING EMAILS