(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
Using someone else's work as your own without credit
An agreement the class makes on how to treat each other. We sign it.
A form of intellectual property that
protects the creators of original works of
authorship. These exclusive rights
generally include the right to reproduce,
distribute, perform, display, and create
derivative works based on the original
work.
A malicious act where someone uses email to deceive individuals into revealing
confidential information such as PIN or
credit card numbers. May contain links with malware or viruses.
Details that can be used to identify,
describe, or contact an individual.
Examples may include name, birthdate,
gender, social security number, address,
height, weight, financial account numbers,
and health information.
The norms of appropriate, responsible
behavior with regard to the use of
technology.
Also known as a digital
trail, this refers to the digital records and
traces that individuals, organizations, or
devices leave behind as a result of their
online activities.
Anyone who uses the internet.
The most basic type of network infrastructure. Commonly found in schools, offices, stores, and homes.
The body of information about an
individual, organization, or device that
exists online. Comes from your digital footprint.
The type of content you take in, and the type of environment you make for others.
A deceptive technique used to trick
individuals into making decisions that
compromise security or privacy. Unlike
hacking, which exploits technical
vulnerabilities, social engineering exploits
human psychology, trust and social
interactions to gain
Having manners online and treating others how you want to be treated.
DOB
A type of social engineering in the form of
enticing behavior aimed at luring
someone into a trap, confrontation, or
harmful situation to reveal personal or
financial information or introduce
malware.
The cables that connect countries via the internet that rest on the ocean floor.
Platforms designed to enable individuals,
groups, and organizations to connect,
communicate and share content.
The practice of monitoring online activities
of individuals as they interact with
websites, applications, and digital services.
an identifying number allocated to an individual by a bank or other organization and used for validating electronic transactions
The use of electronic communication to
bully a person typically by sending
messages of an intimidating or
threatening nature.
Pretending to be someone else, typically
for deceptive or fraudulent purposes.
The physical wires or cables and other things that allow the internet to exist and run smoothly.
Using good sense and sound judgment in practical matters.
The right of an individual to keep certain
aspects of their personal life free from
being observed or disturbed by others
SSN
A global computer packet network that uses standardized protocols.