Yourchoice!Mr.KawaSocialMediaClickbaitAn image orheadline that triesto get you to clickon it, usually foradvertisingpurposesPhishingWhen someone posesas an institution, like abank or a school, andsends you apersonalized messageasking you to provideprivate informationCookiesSmall text filesplaced on yourdevice by the sitesyou visit thatcollect informationabout your deviceand your activityRedFlagFeelingsPrivacySettingsChoices a websiteor app might giveyou about whatinformation isvisible to otherusers and thirdpartiesInernetScamAn attempt to tricksomeone online,usually with theintention ofstealing money orprivate informationFree!ShortenedURLA web address thathas beencondensed and thatcould potentiallymislead a user intogoing into a riskywebsitePrivateInformationInformation thatcan be used toidentify youbecause it isunique to youIdentityTheftA type of crime inwhich your privateinformation isstolen and usedfor criminal activityPersonalInformationPrivacyProtection from beingobserved or trackedby others, includingthe government, thepublic, or selectedindividuals or groupsTheCuriosityGapThe desireevery personhas to figureout missinginformationYourchoice!Mr.KawaSocialMediaClickbaitAn image orheadline that triesto get you to clickon it, usually foradvertisingpurposesPhishingWhen someone posesas an institution, like abank or a school, andsends you apersonalized messageasking you to provideprivate informationCookiesSmall text filesplaced on yourdevice by the sitesyou visit thatcollect informationabout your deviceand your activityRedFlagFeelingsPrivacySettingsChoices a websiteor app might giveyou about whatinformation isvisible to otherusers and thirdpartiesInernetScamAn attempt to tricksomeone online,usually with theintention ofstealing money orprivate informationFree!ShortenedURLA web address thathas beencondensed and thatcould potentiallymislead a user intogoing into a riskywebsitePrivateInformationInformation thatcan be used toidentify youbecause it isunique to youIdentityTheftA type of crime inwhich your privateinformation isstolen and usedfor criminal activityPersonalInformationPrivacyProtection from beingobserved or trackedby others, includingthe government, thepublic, or selectedindividuals or groupsTheCuriosityGapThe desireevery personhas to figureout missinginformation

Computer Science Vocab - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
  1. Your choice!
  2. Mr. Kawa
  3. Social Media
  4. An image or headline that tries to get you to click on it, usually for advertising purposes
    Clickbait
  5. When someone poses as an institution, like a bank or a school, and sends you a personalized message asking you to provide private information
    Phishing
  6. Small text files placed on your device by the sites you visit that collect information about your device and your activity
    Cookies
  7. Red Flag Feelings
  8. Choices a website or app might give you about what information is visible to other users and third parties
    Privacy Settings
  9. An attempt to trick someone online, usually with the intention of stealing money or private information
    Inernet Scam
  10. Free!
  11. A web address that has been condensed and that could potentially mislead a user into going into a risky website
    Shortened URL
  12. Information that can be used to identify you because it is unique to you
    Private Information
  13. A type of crime in which your private information is stolen and used for criminal activity
    Identity Theft
  14. Personal Information
  15. Protection from being observed or tracked by others, including the government, the public, or selected individuals or groups
    Privacy
  16. The desire every person has to figure out missing information
    The Curiosity Gap