(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
A malicious act where someone uses email to deceive individuals into revealing
confidential information such as PIN or
credit card numbers. May contain links with malware or viruses.
Using someone else's work as your own without credit
The type of content you take in, and the type of environment you make for others.
A type of social engineering in the form of
enticing behavior aimed at luring
someone into a trap, confrontation, or
harmful situation to reveal personal or
financial information or introduce
malware.
Pretending to be someone else, typically
for deceptive or fraudulent purposes.
A form of intellectual property that
protects the creators of original works of
authorship. These exclusive rights
generally include the right to reproduce,
distribute, perform, display, and create
derivative works based on the original
work.
The practice of monitoring online activities
of individuals as they interact with
websites, applications, and digital services.
The use of electronic communication to
bully a person typically by sending
messages of an intimidating or
threatening nature.
an identifying number allocated to an individual by a bank or other organization and used for validating electronic transactions
Using good sense and sound judgment in practical matters.
The most basic type of network infrastructure. Commonly found in schools, offices, stores, and homes.
A global computer packet network that uses standardized protocols.
The right of an individual to keep certain
aspects of their personal life free from
being observed or disturbed by others
Platforms designed to enable individuals,
groups, and organizations to connect,
communicate and share content.
Having manners online and treating others how you want to be treated.
The norms of appropriate, responsible
behavior with regard to the use of
technology.
Anyone who uses the internet.
The physical wires or cables and other things that allow the internet to exist and run smoothly.
Also known as a digital
trail, this refers to the digital records and
traces that individuals, organizations, or
devices leave behind as a result of their
online activities.
The cables that connect countries via the internet that rest on the ocean floor.
An agreement the class makes on how to treat each other. We sign it.
A deceptive technique used to trick
individuals into making decisions that
compromise security or privacy. Unlike
hacking, which exploits technical
vulnerabilities, social engineering exploits
human psychology, trust and social
interactions to gain
DOB
SSN
Details that can be used to identify,
describe, or contact an individual.
Examples may include name, birthdate,
gender, social security number, address,
height, weight, financial account numbers,
and health information.
The body of information about an
individual, organization, or device that
exists online. Comes from your digital footprint.