Took part inthe OnlineSafetyQuestionnaireprojectKnows howto reportinappropriatecontent Understandsthe idea ofunintendedaudience Knows howto changeprivacysettings Can give anexample ofoversharingonline Can giveone exampleof a positivedigitalfootprint Knows whatto do with anunsafesurveyresponse Candescribe aresilientresponse tocyberbullying Knows howto block astrangeronline Can explainwhyanonymitymatters insurveys Knows thefirst step ifsomethingonlineupsets them Can explainvisible vsinvisiblefootprints Can name atrustedonline safetyresource Candescribeethical datapresentation Can list twothings neverto shareonline Can explainwhy respectfullanguageonline matters Knows whyit’s risky topost real-timelocations Canidentify aphishingattempt Can explainwhy strongpasswordsmatter Has createda digitalartefact forthis unit Has learnedone newonline safetystrategy thisunit Knowswhat adigitalfootprint is Can give apledge toimproveonlinebehaviour Knows oneresilientbehaviour:talk → act →recover Took part inthe OnlineSafetyQuestionnaireprojectKnows howto reportinappropriatecontent Understandsthe idea ofunintendedaudience Knows howto changeprivacysettings Can give anexample ofoversharingonline Can giveone exampleof a positivedigitalfootprint Knows whatto do with anunsafesurveyresponse Candescribe aresilientresponse tocyberbullying Knows howto block astrangeronline Can explainwhyanonymitymatters insurveys Knows thefirst step ifsomethingonlineupsets them Can explainvisible vsinvisiblefootprints Can name atrustedonline safetyresource Candescribeethical datapresentation Can list twothings neverto shareonline Can explainwhy respectfullanguageonline matters Knows whyit’s risky topost real-timelocations Canidentify aphishingattempt Can explainwhy strongpasswordsmatter Has createda digitalartefact forthis unit Has learnedone newonline safetystrategy thisunit Knowswhat adigitalfootprint is Can give apledge toimproveonlinebehaviour Knows oneresilientbehaviour:talk → act →recover 

worc - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Took part in the Online Safety Questionnaire project
  2. Knows how to report inappropriate content
  3. Understands the idea of unintended audience
  4. Knows how to change privacy settings
  5. Can give an example of oversharing online
  6. Can give one example of a positive digital footprint
  7. Knows what to do with an unsafe survey response
  8. Can describe a resilient response to cyberbullying
  9. Knows how to block a stranger online
  10. Can explain why anonymity matters in surveys
  11. Knows the first step if something online upsets them
  12. Can explain visible vs invisible footprints
  13. Can name a trusted online safety resource
  14. Can describe ethical data presentation
  15. Can list two things never to share online
  16. Can explain why respectful language online matters
  17. Knows why it’s risky to post real-time locations
  18. Can identify a phishing attempt
  19. Can explain why strong passwords matter
  20. Has created a digital artefact for this unit
  21. Has learned one new online safety strategy this unit
  22. Knows what a digital footprint is
  23. Can give a pledge to improve online behaviour
  24. Knows one resilient behaviour: talk → act → recover