Candescribeethical datapresentation Knows oneresilientbehaviour:talk → act →recover Knows thefirst step ifsomethingonlineupsets them Has createda digitalartefact forthis unit Knows whatto do with anunsafesurveyresponse Understandsthe idea ofunintendedaudience Can give anexample ofoversharingonline Canidentify aphishingattempt Knows howto block astrangeronline Can explainwhyanonymitymatters insurveys Can explainwhy strongpasswordsmatter Has learnedone newonline safetystrategy thisunit Can explainwhy respectfullanguageonline matters Knows whyit’s risky topost real-timelocations Knowswhat adigitalfootprint is Can name atrustedonline safetyresource Candescribe aresilientresponse tocyberbullying Can giveone exampleof a positivedigitalfootprint Took part inthe OnlineSafetyQuestionnaireprojectCan give apledge toimproveonlinebehaviour Knows howto changeprivacysettings Can list twothings neverto shareonline Knows howto reportinappropriatecontent Can explainvisible vsinvisiblefootprints Candescribeethical datapresentation Knows oneresilientbehaviour:talk → act →recover Knows thefirst step ifsomethingonlineupsets them Has createda digitalartefact forthis unit Knows whatto do with anunsafesurveyresponse Understandsthe idea ofunintendedaudience Can give anexample ofoversharingonline Canidentify aphishingattempt Knows howto block astrangeronline Can explainwhyanonymitymatters insurveys Can explainwhy strongpasswordsmatter Has learnedone newonline safetystrategy thisunit Can explainwhy respectfullanguageonline matters Knows whyit’s risky topost real-timelocations Knowswhat adigitalfootprint is Can name atrustedonline safetyresource Candescribe aresilientresponse tocyberbullying Can giveone exampleof a positivedigitalfootprint Took part inthe OnlineSafetyQuestionnaireprojectCan give apledge toimproveonlinebehaviour Knows howto changeprivacysettings Can list twothings neverto shareonline Knows howto reportinappropriatecontent Can explainvisible vsinvisiblefootprints 

worc - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Can describe ethical data presentation
  2. Knows one resilient behaviour: talk → act → recover
  3. Knows the first step if something online upsets them
  4. Has created a digital artefact for this unit
  5. Knows what to do with an unsafe survey response
  6. Understands the idea of unintended audience
  7. Can give an example of oversharing online
  8. Can identify a phishing attempt
  9. Knows how to block a stranger online
  10. Can explain why anonymity matters in surveys
  11. Can explain why strong passwords matter
  12. Has learned one new online safety strategy this unit
  13. Can explain why respectful language online matters
  14. Knows why it’s risky to post real-time locations
  15. Knows what a digital footprint is
  16. Can name a trusted online safety resource
  17. Can describe a resilient response to cyberbullying
  18. Can give one example of a positive digital footprint
  19. Took part in the Online Safety Questionnaire project
  20. Can give a pledge to improve online behaviour
  21. Knows how to change privacy settings
  22. Can list two things never to share online
  23. Knows how to report inappropriate content
  24. Can explain visible vs invisible footprints