software thatenables auser toconvert infoto copy datafrom onecomputer toto anotherto cometo anendadishonestschemeto bullyusing anelectronicdeviceadishonestschemebelongingto aspecificpersonto copy datafrom onecomputer toto anotherhaving greatbehaviorwhile usingelectronicssoftware thatenables auser toconvert infoto cometo anendthe correctway ofcommunicatingon the interneta piece ofcode that iscapable ofcorruptingdatasoftware thatdamages ordisables acomputerbelongingto aspecificpersona windowthat openswithout yourpermissionto bullyusing anelectronicdevicea windowthat openswithout yourpermissiona person whouses acomputer togainunauthorizedaccessa piece ofcode that iscapable ofcorruptingdatabelongingto aspecificpersonirrelevant orinappropriatemessagesa person whouses acomputer togainunauthorizedaccesswirelessphonesoftware thatenables auser toconvert infoto copy datafrom onecomputer toto anotherto cometo anendadishonestschemeto bullyusing anelectronicdeviceadishonestschemebelongingto aspecificpersonto copy datafrom onecomputer toto anotherhaving greatbehaviorwhile usingelectronicssoftware thatenables auser toconvert infoto cometo anendthe correctway ofcommunicatingon the interneta piece ofcode that iscapable ofcorruptingdatasoftware thatdamages ordisables acomputerbelongingto aspecificpersona windowthat openswithout yourpermissionto bullyusing anelectronicdevicea windowthat openswithout yourpermissiona person whouses acomputer togainunauthorizedaccessa piece ofcode that iscapable ofcorruptingdatabelongingto aspecificpersonirrelevant orinappropriatemessagesa person whouses acomputer togainunauthorizedaccesswirelessphone

Internet Safety - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
N
3
I
4
O
5
B
6
I
7
B
8
O
9
N
10
I
11
O
12
I
13
B
14
N
15
O
16
B
17
G
18
O
19
I
20
G
21
G
22
N
23
G
24
B
  1. G-software that enables a user to convert info
  2. N-to copy data from one computer to to another
  3. I-to come to an end
  4. O-a dishonest scheme
  5. B-to bully using an electronic device
  6. I-a dishonest scheme
  7. B-belonging to a specific person
  8. O-to copy data from one computer to to another
  9. N-having great behavior while using electronics
  10. I-software that enables a user to convert info
  11. O-to come to an end
  12. I-the correct way of communicating on the internet
  13. B-a piece of code that is capable of corrupting data
  14. N-software that damages or disables a computer
  15. O-belonging to a specific person
  16. B-a window that opens without your permission
  17. G-to bully using an electronic device
  18. O-a window that opens without your permission
  19. I-a person who uses a computer to gain unauthorized access
  20. G-a piece of code that is capable of corrupting data
  21. G-belonging to a specific person
  22. N-irrelevant or inappropriate messages
  23. G-a person who uses a computer to gain unauthorized access
  24. B-wireless phone