Knows oneresilientbehaviour:talk → act →recover Knows whyit’s risky topost real-timelocations Knows howto block astrangeronline Can explainwhyanonymitymatters insurveys Can explainwhy strongpasswordsmatter Can list twothings neverto shareonline Can give apledge toimproveonlinebehaviour Knowswhat adigitalfootprint is Canidentify aphishingattempt Can explainwhy respectfullanguageonline matters Understandsthe idea ofunintendedaudience Took part inthe OnlineSafetyQuestionnaireprojectCan giveone exampleof a positivedigitalfootprint Candescribeethical datapresentation Can give anexample ofoversharingonline Has learnedone newonline safetystrategy thisunit Knows thefirst step ifsomethingonlineupsets them Has createda digitalartefact forthis unit Can explainvisible vsinvisiblefootprints Knows howto changeprivacysettings Knows whatto do with anunsafesurveyresponse Candescribe aresilientresponse tocyberbullying Knows howto reportinappropriatecontent Can name atrustedonline safetyresource Knows oneresilientbehaviour:talk → act →recover Knows whyit’s risky topost real-timelocations Knows howto block astrangeronline Can explainwhyanonymitymatters insurveys Can explainwhy strongpasswordsmatter Can list twothings neverto shareonline Can give apledge toimproveonlinebehaviour Knowswhat adigitalfootprint is Canidentify aphishingattempt Can explainwhy respectfullanguageonline matters Understandsthe idea ofunintendedaudience Took part inthe OnlineSafetyQuestionnaireprojectCan giveone exampleof a positivedigitalfootprint Candescribeethical datapresentation Can give anexample ofoversharingonline Has learnedone newonline safetystrategy thisunit Knows thefirst step ifsomethingonlineupsets them Has createda digitalartefact forthis unit Can explainvisible vsinvisiblefootprints Knows howto changeprivacysettings Knows whatto do with anunsafesurveyresponse Candescribe aresilientresponse tocyberbullying Knows howto reportinappropriatecontent Can name atrustedonline safetyresource 

worc - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Knows one resilient behaviour: talk → act → recover
  2. Knows why it’s risky to post real-time locations
  3. Knows how to block a stranger online
  4. Can explain why anonymity matters in surveys
  5. Can explain why strong passwords matter
  6. Can list two things never to share online
  7. Can give a pledge to improve online behaviour
  8. Knows what a digital footprint is
  9. Can identify a phishing attempt
  10. Can explain why respectful language online matters
  11. Understands the idea of unintended audience
  12. Took part in the Online Safety Questionnaire project
  13. Can give one example of a positive digital footprint
  14. Can describe ethical data presentation
  15. Can give an example of oversharing online
  16. Has learned one new online safety strategy this unit
  17. Knows the first step if something online upsets them
  18. Has created a digital artefact for this unit
  19. Can explain visible vs invisible footprints
  20. Knows how to change privacy settings
  21. Knows what to do with an unsafe survey response
  22. Can describe a resilient response to cyberbullying
  23. Knows how to report inappropriate content
  24. Can name a trusted online safety resource