irrelevant orinappropriatemessagesthe correctway ofcommunicatingon the interneta windowthat openswithout yourpermissionsoftware thatdamages ordisables acomputera windowthat openswithout yourpermissionto cometo anendto cometo anendhaving greatbehaviorwhile usingelectronicsa piece ofcode that iscapable ofcorruptingdatabelongingto aspecificpersonto bullyusing anelectronicdevicea person whouses acomputer togainunauthorizedaccessto copy datafrom onecomputer toto anotherwirelessphonea piece ofcode that iscapable ofcorruptingdatato bullyusing anelectronicdeviceadishonestschemeadishonestschemebelongingto aspecificpersonsoftware thatenables auser toconvert infobelongingto aspecificpersonto copy datafrom onecomputer toto anothersoftware thatenables auser toconvert infoa person whouses acomputer togainunauthorizedaccessirrelevant orinappropriatemessagesthe correctway ofcommunicatingon the interneta windowthat openswithout yourpermissionsoftware thatdamages ordisables acomputera windowthat openswithout yourpermissionto cometo anendto cometo anendhaving greatbehaviorwhile usingelectronicsa piece ofcode that iscapable ofcorruptingdatabelongingto aspecificpersonto bullyusing anelectronicdevicea person whouses acomputer togainunauthorizedaccessto copy datafrom onecomputer toto anotherwirelessphonea piece ofcode that iscapable ofcorruptingdatato bullyusing anelectronicdeviceadishonestschemeadishonestschemebelongingto aspecificpersonsoftware thatenables auser toconvert infobelongingto aspecificpersonto copy datafrom onecomputer toto anothersoftware thatenables auser toconvert infoa person whouses acomputer togainunauthorizedaccess

Internet Safety - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
I
3
O
4
N
5
B
6
I
7
O
8
N
9
G
10
G
11
B
12
I
13
O
14
B
15
B
16
G
17
I
18
O
19
B
20
G
21
O
22
N
23
I
24
G
  1. N-irrelevant or inappropriate messages
  2. I-the correct way of communicating on the internet
  3. O-a window that opens without your permission
  4. N-software that damages or disables a computer
  5. B-a window that opens without your permission
  6. I-to come to an end
  7. O-to come to an end
  8. N-having great behavior while using electronics
  9. G-a piece of code that is capable of corrupting data
  10. G-belonging to a specific person
  11. B-to bully using an electronic device
  12. I-a person who uses a computer to gain unauthorized access
  13. O-to copy data from one computer to to another
  14. B-wireless phone
  15. B-a piece of code that is capable of corrupting data
  16. G-to bully using an electronic device
  17. I-a dishonest scheme
  18. O-a dishonest scheme
  19. B-belonging to a specific person
  20. G-software that enables a user to convert info
  21. O-belonging to a specific person
  22. N-to copy data from one computer to to another
  23. I-software that enables a user to convert info
  24. G-a person who uses a computer to gain unauthorized access