software thatenables auser toconvert infobelongingto aspecificpersonto copy datafrom onecomputer toto anothersoftware thatdamages ordisables acomputera piece ofcode that iscapable ofcorruptingdatairrelevant orinappropriatemessageshaving greatbehaviorwhile usingelectronicsa person whouses acomputer togainunauthorizedaccessto copy datafrom onecomputer toto anothera windowthat openswithout yourpermissionto bullyusing anelectronicdevicewirelessphonea person whouses acomputer togainunauthorizedaccessa piece ofcode that iscapable ofcorruptingdatato cometo anendadishonestschemeadishonestschemebelongingto aspecificpersona windowthat openswithout yourpermissionsoftware thatenables auser toconvert infoto cometo anendto bullyusing anelectronicdevicethe correctway ofcommunicatingon the internetbelongingto aspecificpersonsoftware thatenables auser toconvert infobelongingto aspecificpersonto copy datafrom onecomputer toto anothersoftware thatdamages ordisables acomputera piece ofcode that iscapable ofcorruptingdatairrelevant orinappropriatemessageshaving greatbehaviorwhile usingelectronicsa person whouses acomputer togainunauthorizedaccessto copy datafrom onecomputer toto anothera windowthat openswithout yourpermissionto bullyusing anelectronicdevicewirelessphonea person whouses acomputer togainunauthorizedaccessa piece ofcode that iscapable ofcorruptingdatato cometo anendadishonestschemeadishonestschemebelongingto aspecificpersona windowthat openswithout yourpermissionsoftware thatenables auser toconvert infoto cometo anendto bullyusing anelectronicdevicethe correctway ofcommunicatingon the internetbelongingto aspecificperson

Internet Safety - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
O
3
N
4
N
5
B
6
N
7
N
8
G
9
O
10
O
11
G
12
B
13
I
14
G
15
I
16
I
17
O
18
G
19
B
20
I
21
O
22
B
23
I
24
B
  1. G-software that enables a user to convert info
  2. O-belonging to a specific person
  3. N-to copy data from one computer to to another
  4. N-software that damages or disables a computer
  5. B-a piece of code that is capable of corrupting data
  6. N-irrelevant or inappropriate messages
  7. N-having great behavior while using electronics
  8. G-a person who uses a computer to gain unauthorized access
  9. O-to copy data from one computer to to another
  10. O-a window that opens without your permission
  11. G-to bully using an electronic device
  12. B-wireless phone
  13. I-a person who uses a computer to gain unauthorized access
  14. G-a piece of code that is capable of corrupting data
  15. I-to come to an end
  16. I-a dishonest scheme
  17. O-a dishonest scheme
  18. G-belonging to a specific person
  19. B-a window that opens without your permission
  20. I-software that enables a user to convert info
  21. O-to come to an end
  22. B-to bully using an electronic device
  23. I-the correct way of communicating on the internet
  24. B-belonging to a specific person