Understandsthe idea ofunintendedaudience Can explainwhy respectfullanguageonline matters Can explainwhyanonymitymatters insurveys Can give anexample ofoversharingonline Candescribeethical datapresentation Knows oneresilientbehaviour:talk → act →recover Canidentify aphishingattempt Has createda digitalartefact forthis unit Candescribe aresilientresponse tocyberbullying Knows whatto do with anunsafesurveyresponse Took part inthe OnlineSafetyQuestionnaireprojectCan explainwhy strongpasswordsmatter Knows whyit’s risky topost real-timelocations Knows howto changeprivacysettings Knowswhat adigitalfootprint is Knows howto block astrangeronline Knows thefirst step ifsomethingonlineupsets them Can explainvisible vsinvisiblefootprints Can name atrustedonline safetyresource Can list twothings neverto shareonline Has learnedone newonline safetystrategy thisunit Can giveone exampleof a positivedigitalfootprint Knows howto reportinappropriatecontent Can give apledge toimproveonlinebehaviour Understandsthe idea ofunintendedaudience Can explainwhy respectfullanguageonline matters Can explainwhyanonymitymatters insurveys Can give anexample ofoversharingonline Candescribeethical datapresentation Knows oneresilientbehaviour:talk → act →recover Canidentify aphishingattempt Has createda digitalartefact forthis unit Candescribe aresilientresponse tocyberbullying Knows whatto do with anunsafesurveyresponse Took part inthe OnlineSafetyQuestionnaireprojectCan explainwhy strongpasswordsmatter Knows whyit’s risky topost real-timelocations Knows howto changeprivacysettings Knowswhat adigitalfootprint is Knows howto block astrangeronline Knows thefirst step ifsomethingonlineupsets them Can explainvisible vsinvisiblefootprints Can name atrustedonline safetyresource Can list twothings neverto shareonline Has learnedone newonline safetystrategy thisunit Can giveone exampleof a positivedigitalfootprint Knows howto reportinappropriatecontent Can give apledge toimproveonlinebehaviour 

worc - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Understands the idea of unintended audience
  2. Can explain why respectful language online matters
  3. Can explain why anonymity matters in surveys
  4. Can give an example of oversharing online
  5. Can describe ethical data presentation
  6. Knows one resilient behaviour: talk → act → recover
  7. Can identify a phishing attempt
  8. Has created a digital artefact for this unit
  9. Can describe a resilient response to cyberbullying
  10. Knows what to do with an unsafe survey response
  11. Took part in the Online Safety Questionnaire project
  12. Can explain why strong passwords matter
  13. Knows why it’s risky to post real-time locations
  14. Knows how to change privacy settings
  15. Knows what a digital footprint is
  16. Knows how to block a stranger online
  17. Knows the first step if something online upsets them
  18. Can explain visible vs invisible footprints
  19. Can name a trusted online safety resource
  20. Can list two things never to share online
  21. Has learned one new online safety strategy this unit
  22. Can give one example of a positive digital footprint
  23. Knows how to report inappropriate content
  24. Can give a pledge to improve online behaviour