belongingto aspecificpersonsoftware thatdamages ordisables acomputersoftware thatenables auser toconvert infobelongingto aspecificpersona windowthat openswithout yourpermissionbelongingto aspecificpersona person whouses acomputer togainunauthorizedaccessirrelevant orinappropriatemessageswirelessphonea windowthat openswithout yourpermissionto cometo anendto copy datafrom onecomputer toto anothera person whouses acomputer togainunauthorizedaccesshaving greatbehaviorwhile usingelectronicsa piece ofcode that iscapable ofcorruptingdataa piece ofcode that iscapable ofcorruptingdatato bullyusing anelectronicdeviceto bullyusing anelectronicdeviceadishonestschemethe correctway ofcommunicatingon the internetsoftware thatenables auser toconvert infoadishonestschemeto copy datafrom onecomputer toto anotherto cometo anendbelongingto aspecificpersonsoftware thatdamages ordisables acomputersoftware thatenables auser toconvert infobelongingto aspecificpersona windowthat openswithout yourpermissionbelongingto aspecificpersona person whouses acomputer togainunauthorizedaccessirrelevant orinappropriatemessageswirelessphonea windowthat openswithout yourpermissionto cometo anendto copy datafrom onecomputer toto anothera person whouses acomputer togainunauthorizedaccesshaving greatbehaviorwhile usingelectronicsa piece ofcode that iscapable ofcorruptingdataa piece ofcode that iscapable ofcorruptingdatato bullyusing anelectronicdeviceto bullyusing anelectronicdeviceadishonestschemethe correctway ofcommunicatingon the internetsoftware thatenables auser toconvert infoadishonestschemeto copy datafrom onecomputer toto anotherto cometo anend

Internet Safety - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
N
3
G
4
B
5
B
6
O
7
G
8
N
9
B
10
O
11
I
12
O
13
I
14
N
15
G
16
B
17
B
18
G
19
O
20
I
21
I
22
I
23
N
24
O
  1. G-belonging to a specific person
  2. N-software that damages or disables a computer
  3. G-software that enables a user to convert info
  4. B-belonging to a specific person
  5. B-a window that opens without your permission
  6. O-belonging to a specific person
  7. G-a person who uses a computer to gain unauthorized access
  8. N-irrelevant or inappropriate messages
  9. B-wireless phone
  10. O-a window that opens without your permission
  11. I-to come to an end
  12. O-to copy data from one computer to to another
  13. I-a person who uses a computer to gain unauthorized access
  14. N-having great behavior while using electronics
  15. G-a piece of code that is capable of corrupting data
  16. B-a piece of code that is capable of corrupting data
  17. B-to bully using an electronic device
  18. G-to bully using an electronic device
  19. O-a dishonest scheme
  20. I-the correct way of communicating on the internet
  21. I-software that enables a user to convert info
  22. I-a dishonest scheme
  23. N-to copy data from one computer to to another
  24. O-to come to an end