Knows whatto do with anunsafesurveyresponse Can explainwhyanonymitymatters insurveys Knows thefirst step ifsomethingonlineupsets them Knows oneresilientbehaviour:talk → act →recover Knows howto changeprivacysettings Knows whyit’s risky topost real-timelocations Can giveone exampleof a positivedigitalfootprint Can explainwhy strongpasswordsmatter Can give anexample ofoversharingonline Can name atrustedonline safetyresource Can explainwhy respectfullanguageonline matters Candescribeethical datapresentation Knowswhat adigitalfootprint is Understandsthe idea ofunintendedaudience Can give apledge toimproveonlinebehaviour Canidentify aphishingattempt Knows howto block astrangeronline Candescribe aresilientresponse tocyberbullying Has createda digitalartefact forthis unit Knows howto reportinappropriatecontent Can list twothings neverto shareonline Has learnedone newonline safetystrategy thisunit Can explainvisible vsinvisiblefootprints Took part inthe OnlineSafetyQuestionnaireprojectKnows whatto do with anunsafesurveyresponse Can explainwhyanonymitymatters insurveys Knows thefirst step ifsomethingonlineupsets them Knows oneresilientbehaviour:talk → act →recover Knows howto changeprivacysettings Knows whyit’s risky topost real-timelocations Can giveone exampleof a positivedigitalfootprint Can explainwhy strongpasswordsmatter Can give anexample ofoversharingonline Can name atrustedonline safetyresource Can explainwhy respectfullanguageonline matters Candescribeethical datapresentation Knowswhat adigitalfootprint is Understandsthe idea ofunintendedaudience Can give apledge toimproveonlinebehaviour Canidentify aphishingattempt Knows howto block astrangeronline Candescribe aresilientresponse tocyberbullying Has createda digitalartefact forthis unit Knows howto reportinappropriatecontent Can list twothings neverto shareonline Has learnedone newonline safetystrategy thisunit Can explainvisible vsinvisiblefootprints Took part inthe OnlineSafetyQuestionnaireproject

worc - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Knows what to do with an unsafe survey response
  2. Can explain why anonymity matters in surveys
  3. Knows the first step if something online upsets them
  4. Knows one resilient behaviour: talk → act → recover
  5. Knows how to change privacy settings
  6. Knows why it’s risky to post real-time locations
  7. Can give one example of a positive digital footprint
  8. Can explain why strong passwords matter
  9. Can give an example of oversharing online
  10. Can name a trusted online safety resource
  11. Can explain why respectful language online matters
  12. Can describe ethical data presentation
  13. Knows what a digital footprint is
  14. Understands the idea of unintended audience
  15. Can give a pledge to improve online behaviour
  16. Can identify a phishing attempt
  17. Knows how to block a stranger online
  18. Can describe a resilient response to cyberbullying
  19. Has created a digital artefact for this unit
  20. Knows how to report inappropriate content
  21. Can list two things never to share online
  22. Has learned one new online safety strategy this unit
  23. Can explain visible vs invisible footprints
  24. Took part in the Online Safety Questionnaire project