the correctway ofcommunicatingon the internethaving greatbehaviorwhile usingelectronicssoftware thatdamages ordisables acomputerto copy datafrom onecomputer toto anotherbelongingto aspecificpersonadishonestschemebelongingto aspecificpersona piece ofcode that iscapable ofcorruptingdatawirelessphonea piece ofcode that iscapable ofcorruptingdatato cometo anenda windowthat openswithout yourpermissionto cometo anendto bullyusing anelectronicdevicea person whouses acomputer togainunauthorizedaccessto bullyusing anelectronicdevicebelongingto aspecificpersonto copy datafrom onecomputer toto anothersoftware thatenables auser toconvert infosoftware thatenables auser toconvert infoa windowthat openswithout yourpermissionirrelevant orinappropriatemessagesadishonestschemea person whouses acomputer togainunauthorizedaccessthe correctway ofcommunicatingon the internethaving greatbehaviorwhile usingelectronicssoftware thatdamages ordisables acomputerto copy datafrom onecomputer toto anotherbelongingto aspecificpersonadishonestschemebelongingto aspecificpersona piece ofcode that iscapable ofcorruptingdatawirelessphonea piece ofcode that iscapable ofcorruptingdatato cometo anenda windowthat openswithout yourpermissionto cometo anendto bullyusing anelectronicdevicea person whouses acomputer togainunauthorizedaccessto bullyusing anelectronicdevicebelongingto aspecificpersonto copy datafrom onecomputer toto anothersoftware thatenables auser toconvert infosoftware thatenables auser toconvert infoa windowthat openswithout yourpermissionirrelevant orinappropriatemessagesadishonestschemea person whouses acomputer togainunauthorizedaccess

Internet Safety - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
N
3
N
4
N
5
O
6
I
7
B
8
G
9
B
10
B
11
I
12
O
13
O
14
B
15
I
16
G
17
G
18
O
19
I
20
G
21
B
22
N
23
O
24
G
  1. I-the correct way of communicating on the internet
  2. N-having great behavior while using electronics
  3. N-software that damages or disables a computer
  4. N-to copy data from one computer to to another
  5. O-belonging to a specific person
  6. I-a dishonest scheme
  7. B-belonging to a specific person
  8. G-a piece of code that is capable of corrupting data
  9. B-wireless phone
  10. B-a piece of code that is capable of corrupting data
  11. I-to come to an end
  12. O-a window that opens without your permission
  13. O-to come to an end
  14. B-to bully using an electronic device
  15. I-a person who uses a computer to gain unauthorized access
  16. G-to bully using an electronic device
  17. G-belonging to a specific person
  18. O-to copy data from one computer to to another
  19. I-software that enables a user to convert info
  20. G-software that enables a user to convert info
  21. B-a window that opens without your permission
  22. N-irrelevant or inappropriate messages
  23. O-a dishonest scheme
  24. G-a person who uses a computer to gain unauthorized access