(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
the information about a particular person that exists on the internet as a result of their online activity.
digital footprint
secret series of numbers or letters that allows you to access a locked computer or program
password
Protect Your Personal Information Online:
Create strong passwords.
Don't overshare on social media.
Use free Wi-Fi with caution.
Watch out for links and attachments.
Check to see if the site is secure.
protect
false information published as being authentic
fake news
sensationalist headline or link to an article, blog, or other Internet content that exists for the purpose of attracting attention, or “drawing clicks.” Once a user clicks on the headline or image, the website is often mostly ads.
clickbait
having the skills you need to live, learn, and work in a society where communication and access to information is increasingly through digital technologies like internet platforms, social media, and mobile devices.
digital literacy
the conventions of being a responsible online citizen
digital etiquette
skills required to find, evaluate, use, share, and create content online
media literacy
direct message, on Twitter or other social media platform. DMs allow a user to directly contact another user, without the messages being seen in a public forum
DM
Uniform Resource Locator, or “address” for a web page.
URL
used to describe online harassment, which can be in the form of flames, comments made in chat rooms, the sending of offensive or cruel e-mail, or even harassing others by posting on blogs, Web pages or social networking sites
cyberbullying
online commenter whose intent is to to deliberately post something offensive to provoke a reaction by attacking views expressed online; these attacks are often personal
troll
provides a virtual community for people interested in a common subject or just a place to socialize with others online
social media
small file that some websites attach to a user’s hard drive while the user is browsing that site; they can be used to track user preferences, speed loading times, and for advertising.
cookie
someone who recognizes when something is wrong and does something to make it right. If an upstander sees or hears about bullying, he or she will do something. This could mean stopping the bully, reporting the event, or otherwise helping the vict
upstander
the practice of taking someone else's work or ideas and passing them off as one's own.
plagiarism
personal information includes your likes and dislikes. PRIVATE information includes things that can identify you (full name, phone number, address, birthday)
personal information
acting safely, responsibly, and respectfully online
Digital Citizenship
sending email that attempts to scam the user into giving up private information to be used for identity theft
phishing
personal information includes your likes and dislikes. PRIVATE information includes things that can identify you (full name, phone number, address, birthday)
personal/private information