software thatenables auser toconvert infoto bullyusing anelectronicdevicebelongingto aspecificpersonbelongingto aspecificpersonadishonestschemea piece ofcode that iscapable ofcorruptingdatato copy datafrom onecomputer toto anothersoftware thatdamages ordisables acomputersoftware thatenables auser toconvert infothe correctway ofcommunicatingon the internetto copy datafrom onecomputer toto anotherto cometo anendto bullyusing anelectronicdevicebelongingto aspecificpersonirrelevant orinappropriatemessagesto cometo anenda person whouses acomputer togainunauthorizedaccessa piece ofcode that iscapable ofcorruptingdataadishonestschemea person whouses acomputer togainunauthorizedaccessa windowthat openswithout yourpermissionwirelessphonehaving greatbehaviorwhile usingelectronicsa windowthat openswithout yourpermissionsoftware thatenables auser toconvert infoto bullyusing anelectronicdevicebelongingto aspecificpersonbelongingto aspecificpersonadishonestschemea piece ofcode that iscapable ofcorruptingdatato copy datafrom onecomputer toto anothersoftware thatdamages ordisables acomputersoftware thatenables auser toconvert infothe correctway ofcommunicatingon the internetto copy datafrom onecomputer toto anotherto cometo anendto bullyusing anelectronicdevicebelongingto aspecificpersonirrelevant orinappropriatemessagesto cometo anenda person whouses acomputer togainunauthorizedaccessa piece ofcode that iscapable ofcorruptingdataadishonestschemea person whouses acomputer togainunauthorizedaccessa windowthat openswithout yourpermissionwirelessphonehaving greatbehaviorwhile usingelectronicsa windowthat openswithout yourpermission

Internet Safety - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
G
3
G
4
O
5
O
6
B
7
N
8
N
9
G
10
I
11
O
12
O
13
B
14
B
15
N
16
I
17
I
18
G
19
I
20
G
21
B
22
B
23
N
24
O
  1. I-software that enables a user to convert info
  2. G-to bully using an electronic device
  3. G-belonging to a specific person
  4. O-belonging to a specific person
  5. O-a dishonest scheme
  6. B-a piece of code that is capable of corrupting data
  7. N-to copy data from one computer to to another
  8. N-software that damages or disables a computer
  9. G-software that enables a user to convert info
  10. I-the correct way of communicating on the internet
  11. O-to copy data from one computer to to another
  12. O-to come to an end
  13. B-to bully using an electronic device
  14. B-belonging to a specific person
  15. N-irrelevant or inappropriate messages
  16. I-to come to an end
  17. I-a person who uses a computer to gain unauthorized access
  18. G-a piece of code that is capable of corrupting data
  19. I-a dishonest scheme
  20. G-a person who uses a computer to gain unauthorized access
  21. B-a window that opens without your permission
  22. B-wireless phone
  23. N-having great behavior while using electronics
  24. O-a window that opens without your permission