Protectto keepsomethingsafeReputablea news source,website, author, orspecialist that isconsideredtrustworthy andreputableResultPagespagesdisplayed by asearch enginein response toa questionMessageinfo you sendor give anotherperson throughtext or emailInternetA system thatconnects people allover the world usingcomputers, tablets,phones, and otherdevicesUsernamea unique ormade up namethat allows youto accesswebsites oronline accountsRegisterto put info,such as yourname, into awebsite to beable to use itPersonalInformationgeneral info likeage and genderthat cannot beused to identifya personCitationcredit given to asource used in apaper or researchproject thatincludes info suchas author and titleAnonymouswhen no author,contributor, orname isassociated with anarticle or storyCyberbullyingusing the internet orcellphone, usuallyover and over again,to make anotherperson feel unhappy,sad, or afraidComputerVirusan unwantedprogram thatcan damageyour computercan be mild orvery destructivePrivateInformationspecific info,such as ss#,address, phone#, that can beused to identifya personPrivacyPolicya websitesstatement orlegal documentfor how theyhandle privateinformationPassworda secret word orexpressionrequired bymany websitesto allow you tovisit themOversharingsharing too muchonline such aspersonal info orcertain situationsor conversationsSourcepagesdisplayed by asearch engine,in response toa questionLinka phrase oricon you canclick to go toanother site oranother websiteOnlinebeing connectedto the internet, acomputer, or anytype of computernetworkPlagiarismcopying or usingsomebody's else'swork and claiming itas your own by notgiving credit to theoriginal authorKeywordswords used otsearch for infoon the internetabout a topicor ideasPasswordProtectiona security measurethat protectspasswords andprevents the wrongpeople from usingonline accountsSpaman onlinemessage,usuallydisruptive thatthe receiver didnot requestSeal ofApprovalofficial statementor stamp that awebsite isreputable anddoing a good jobBibliographylist of thesources usedfor a researchpaper orprojectAcceptableUse Policya document thatall students andguardians signwhen receivinga school deviceNetiquettethe correct oracceptableway ofcommunicatingon the internetEmaila way to sendmessageselectronicallyover theinternetOnlineSafetyfreedomfrom dangeror harmwhile usingthe internetDigitalFootprintinfo about you that ison the internet,including websitesyou visit, emals yousend, and commentsyou makeOnlineResponsibilityobligation orduty you haveto yourself orothers whenonlineTargetsomeonewho isbeingcyberbulliedWebsitea place you canvisit while usingthe internet thathas info on aperson, companyor organizationIdentityTheftillegal use ofsomebody'sprivate info,such as name orss# to getmoney or creditBystandera person whowitnesses or knowsabout a case ofcyberbullying butdoes nothing tohelp the targetFakeNewsnews or storiesthat are created onpurpose to befalse to deceive ormisinform readersSearchlooking forinfo or ideason theinternetUpstanderperson whosupports thetarget whenthey knowcyberbullying ishappeningPrivatepersonal infothat you shouldkeep to yourselfor only sharewith people youtrustProtectto keepsomethingsafeReputablea news source,website, author, orspecialist that isconsideredtrustworthy andreputableResultPagespagesdisplayed by asearch enginein response toa questionMessageinfo you sendor give anotherperson throughtext or emailInternetA system thatconnects people allover the world usingcomputers, tablets,phones, and otherdevicesUsernamea unique ormade up namethat allows youto accesswebsites oronline accountsRegisterto put info,such as yourname, into awebsite to beable to use itPersonalInformationgeneral info likeage and genderthat cannot beused to identifya personCitationcredit given to asource used in apaper or researchproject thatincludes info suchas author and titleAnonymouswhen no author,contributor, orname isassociated with anarticle or storyCyberbullyingusing the internet orcellphone, usuallyover and over again,to make anotherperson feel unhappy,sad, or afraidComputerVirusan unwantedprogram thatcan damageyour computercan be mild orvery destructivePrivateInformationspecific info,such as ss#,address, phone#, that can beused to identifya personPrivacyPolicya websitesstatement orlegal documentfor how theyhandle privateinformationPassworda secret word orexpressionrequired bymany websitesto allow you tovisit themOversharingsharing too muchonline such aspersonal info orcertain situationsor conversationsSourcepagesdisplayed by asearch engine,in response toa questionLinka phrase oricon you canclick to go toanother site oranother websiteOnlinebeing connectedto the internet, acomputer, or anytype of computernetworkPlagiarismcopying or usingsomebody's else'swork and claiming itas your own by notgiving credit to theoriginal authorKeywordswords used otsearch for infoon the internetabout a topicor ideasPasswordProtectiona security measurethat protectspasswords andprevents the wrongpeople from usingonline accountsSpaman onlinemessage,usuallydisruptive thatthe receiver didnot requestSeal ofApprovalofficial statementor stamp that awebsite isreputable anddoing a good jobBibliographylist of thesources usedfor a researchpaper orprojectAcceptableUse Policya document thatall students andguardians signwhen receivinga school deviceNetiquettethe correct oracceptableway ofcommunicatingon the internetEmaila way to sendmessageselectronicallyover theinternetOnlineSafetyfreedomfrom dangeror harmwhile usingthe internetDigitalFootprintinfo about you that ison the internet,including websitesyou visit, emals yousend, and commentsyou makeOnlineResponsibilityobligation orduty you haveto yourself orothers whenonlineTargetsomeonewho isbeingcyberbulliedWebsitea place you canvisit while usingthe internet thathas info on aperson, companyor organizationIdentityTheftillegal use ofsomebody'sprivate info,such as name orss# to getmoney or creditBystandera person whowitnesses or knowsabout a case ofcyberbullying butdoes nothing tohelp the targetFakeNewsnews or storiesthat are created onpurpose to befalse to deceive ormisinform readersSearchlooking forinfo or ideason theinternetUpstanderperson whosupports thetarget whenthey knowcyberbullying ishappeningPrivatepersonal infothat you shouldkeep to yourselfor only sharewith people youtrust

Digital Citizenship Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. to keep something safe
    Protect
  2. a news source, website, author, or specialist that is considered trustworthy and reputable
    Reputable
  3. pages displayed by a search engine in response to a question
    Result Pages
  4. info you send or give another person through text or email
    Message
  5. A system that connects people all over the world using computers, tablets, phones, and other devices
    Internet
  6. a unique or made up name that allows you to access websites or online accounts
    Username
  7. to put info, such as your name, into a website to be able to use it
    Register
  8. general info like age and gender that cannot be used to identify a person
    Personal Information
  9. credit given to a source used in a paper or research project that includes info such as author and title
    Citation
  10. when no author, contributor, or name is associated with an article or story
    Anonymous
  11. using the internet or cellphone, usually over and over again, to make another person feel unhappy, sad, or afraid
    Cyberbullying
  12. an unwanted program that can damage your computer can be mild or very destructive
    Computer Virus
  13. specific info, such as ss#, address, phone #, that can be used to identify a person
    Private Information
  14. a websites statement or legal document for how they handle private information
    Privacy Policy
  15. a secret word or expression required by many websites to allow you to visit them
    Password
  16. sharing too much online such as personal info or certain situations or conversations
    Oversharing
  17. pages displayed by a search engine, in response to a question
    Source
  18. a phrase or icon you can click to go to another site or another website
    Link
  19. being connected to the internet, a computer, or any type of computer network
    Online
  20. copying or using somebody's else's work and claiming it as your own by not giving credit to the original author
    Plagiarism
  21. words used ot search for info on the internet about a topic or ideas
    Keywords
  22. a security measure that protects passwords and prevents the wrong people from using online accounts
    Password Protection
  23. an online message, usually disruptive that the receiver did not request
    Spam
  24. official statement or stamp that a website is reputable and doing a good job
    Seal of Approval
  25. list of the sources used for a research paper or project
    Bibliography
  26. a document that all students and guardians sign when receiving a school device
    Acceptable Use Policy
  27. the correct or acceptable way of communicating on the internet
    Netiquette
  28. a way to send messages electronically over the internet
    Email
  29. freedom from danger or harm while using the internet
    Online Safety
  30. info about you that is on the internet, including websites you visit, emals you send, and comments you make
    Digital Footprint
  31. obligation or duty you have to yourself or others when online
    Online Responsibility
  32. someone who is being cyberbullied
    Target
  33. a place you can visit while using the internet that has info on a person, company or organization
    Website
  34. illegal use of somebody's private info, such as name or ss# to get money or credit
    Identity Theft
  35. a person who witnesses or knows about a case of cyberbullying but does nothing to help the target
    Bystander
  36. news or stories that are created on purpose to be false to deceive or misinform readers
    Fake News
  37. looking for info or ideas on the internet
    Search
  38. person who supports the target when they know cyberbullying is happening
    Upstander
  39. personal info that you should keep to yourself or only share with people you trust
    Private