Knows thefirst step ifsomethingonlineupsets them Can name atrustedonline safetyresource Knows whatto do with anunsafesurveyresponse Took part inthe OnlineSafetyQuestionnaireprojectCandescribe aresilientresponse tocyberbullying Can list twothings neverto shareonline Knowswhat adigitalfootprint is Knows howto changeprivacysettings Can give apledge toimproveonlinebehaviour Can give anexample ofoversharingonline Can explainwhy respectfullanguageonline matters Can explainvisible vsinvisiblefootprints Canidentify aphishingattempt Knows howto reportinappropriatecontent Knows whyit’s risky topost real-timelocations Understandsthe idea ofunintendedaudience Has createda digitalartefact forthis unit Can explainwhy strongpasswordsmatter Has learnedone newonline safetystrategy thisunit Can giveone exampleof a positivedigitalfootprint Knows howto block astrangeronline Candescribeethical datapresentation Can explainwhyanonymitymatters insurveys Knows oneresilientbehaviour:talk → act →recover Knows thefirst step ifsomethingonlineupsets them Can name atrustedonline safetyresource Knows whatto do with anunsafesurveyresponse Took part inthe OnlineSafetyQuestionnaireprojectCandescribe aresilientresponse tocyberbullying Can list twothings neverto shareonline Knowswhat adigitalfootprint is Knows howto changeprivacysettings Can give apledge toimproveonlinebehaviour Can give anexample ofoversharingonline Can explainwhy respectfullanguageonline matters Can explainvisible vsinvisiblefootprints Canidentify aphishingattempt Knows howto reportinappropriatecontent Knows whyit’s risky topost real-timelocations Understandsthe idea ofunintendedaudience Has createda digitalartefact forthis unit Can explainwhy strongpasswordsmatter Has learnedone newonline safetystrategy thisunit Can giveone exampleof a positivedigitalfootprint Knows howto block astrangeronline Candescribeethical datapresentation Can explainwhyanonymitymatters insurveys Knows oneresilientbehaviour:talk → act →recover 

worc - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Knows the first step if something online upsets them
  2. Can name a trusted online safety resource
  3. Knows what to do with an unsafe survey response
  4. Took part in the Online Safety Questionnaire project
  5. Can describe a resilient response to cyberbullying
  6. Can list two things never to share online
  7. Knows what a digital footprint is
  8. Knows how to change privacy settings
  9. Can give a pledge to improve online behaviour
  10. Can give an example of oversharing online
  11. Can explain why respectful language online matters
  12. Can explain visible vs invisible footprints
  13. Can identify a phishing attempt
  14. Knows how to report inappropriate content
  15. Knows why it’s risky to post real-time locations
  16. Understands the idea of unintended audience
  17. Has created a digital artefact for this unit
  18. Can explain why strong passwords matter
  19. Has learned one new online safety strategy this unit
  20. Can give one example of a positive digital footprint
  21. Knows how to block a stranger online
  22. Can describe ethical data presentation
  23. Can explain why anonymity matters in surveys
  24. Knows one resilient behaviour: talk → act → recover