GENERATION X PLAGIARISM CYBER BULLYING AND FREEDOM OF SPEECH FREEDOM OF SPEECH TECHNOLOGY DEPENDENCY DIGITAL DIVIDE 1997 HACKING AND CYBER SECURITY ELECTRONIC COMMUNICATIONS PRIVACY ACT APPLE PRIVACY GENERATIONAL CHANGES PROS AND CONS OF TECHNOLOGY SCREEN TIME THE PRIVACY ACT OF 1974 SOCIAL MEDIA MODERNIZING THE WORKFORCE 68% PHISHING EMAILS IDENTITY THEFT PROTECTION 59- 77 BOUNDARIES AGEISM COVID GENERATION X PLAGIARISM CYBER BULLYING AND FREEDOM OF SPEECH FREEDOM OF SPEECH TECHNOLOGY DEPENDENCY DIGITAL DIVIDE 1997 HACKING AND CYBER SECURITY ELECTRONIC COMMUNICATIONS PRIVACY ACT APPLE PRIVACY GENERATIONAL CHANGES PROS AND CONS OF TECHNOLOGY SCREEN TIME THE PRIVACY ACT OF 1974 SOCIAL MEDIA MODERNIZING THE WORKFORCE 68% PHISHING EMAILS IDENTITY THEFT PROTECTION 59- 77 BOUNDARIES AGEISM COVID
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
GENERATION X
PLAGIARISM
CYBER BULLYING AND FREEDOM OF SPEECH
FREEDOM OF SPEECH
TECHNOLOGY DEPENDENCY
DIGITAL DIVIDE
1997
HACKING AND CYBER SECURITY
ELECTRONIC COMMUNICATIONS PRIVACY ACT
APPLE
PRIVACY
GENERATIONAL CHANGES
PROS AND CONS OF TECHNOLOGY
SCREEN TIME
THE PRIVACY ACT OF 1974
SOCIAL MEDIA
MODERNIZING THE WORKFORCE
68%
PHISHING EMAILS
IDENTITY THEFT PROTECTION
59-77
BOUNDARIES
AGEISM
COVID