personalinformationpersonal informationincludes your likes anddislikes. PRIVATEinformation includesthings that can identifyyou (full name, phonenumber, address,birthday)clickbaitsensationalist headline orlink to an article, blog, orother Internet content thatexists for the purpose ofattracting attention, or“drawing clicks.” Once auser clicks on the headlineor image, the website isoften mostly ads.upstandersomeone who recognizeswhen something is wrongand does something tomake it right. If anupstander sees or hearsabout bullying, he or shewill do something. Thiscould mean stopping thebully, reporting the event,or otherwise helping thevictpersonal/privateinformationpersonal informationincludes your likes anddislikes. PRIVATEinformation includesthings that can identifyyou (full name, phonenumber, address,birthday)cookiesmall file that somewebsites attach to auser’s hard drive whilethe user is browsingthat site; they can beused to track userpreferences, speedloading times, and foradvertising.digitalfootprintthe informationabout a particularperson that existson the internet asa result of theironline activity.DigitalCitizenshipacting safely,responsibly,andrespectfullyonlinedigitalliteracyhaving the skills you needto live, learn, and work in asociety wherecommunication and accessto information isincreasingly through digitaltechnologies like internetplatforms, social media,and mobile devices.cyberbullyingused to describe onlineharassment, which can bein the form of flames,comments made in chatrooms, the sending ofoffensive or cruel e-mail, oreven harassing others byposting on blogs, Webpages or social networkingsitessocialmediaprovides a virtualcommunity forpeople interested ina common subjector just a place tosocialize with othersonlinedigitaletiquettetheconventionsof being aresponsibleonline citizentrollonline commenterwhose intent is to todeliberately postsomething offensive toprovoke a reaction byattacking viewsexpressed online;these attacks are oftenpersonalprotectProtect Your PersonalInformation Online:Create strong passwords.Don't overshare on socialmedia.Use free Wi-Fi with caution.Watch out for links andattachments.Check to see if the site issecure.medialiteracyskills requiredto find,evaluate, use,share, andcreate contentonlineURLUniformResourceLocator, or“address” fora web page.phishingsending email thatattempts to scam theuser into giving upprivate information tobe used for identitytheftpasswordsecret series ofnumbers or lettersthat allows you toaccess a lockedcomputer orprogramDMdirect message, onTwitter or other socialmedia platform. DMsallow a user to directlycontact another user,without the messagesbeing seen in a publicforumplagiarismthe practice oftaking someoneelse's work orideas and passingthem off as one'sown.fakenewsfalseinformationpublished asbeingauthenticpersonalinformationpersonal informationincludes your likes anddislikes. PRIVATEinformation includesthings that can identifyyou (full name, phonenumber, address,birthday)clickbaitsensationalist headline orlink to an article, blog, orother Internet content thatexists for the purpose ofattracting attention, or“drawing clicks.” Once auser clicks on the headlineor image, the website isoften mostly ads.upstandersomeone who recognizeswhen something is wrongand does something tomake it right. If anupstander sees or hearsabout bullying, he or shewill do something. Thiscould mean stopping thebully, reporting the event,or otherwise helping thevictpersonal/privateinformationpersonal informationincludes your likes anddislikes. PRIVATEinformation includesthings that can identifyyou (full name, phonenumber, address,birthday)cookiesmall file that somewebsites attach to auser’s hard drive whilethe user is browsingthat site; they can beused to track userpreferences, speedloading times, and foradvertising.digitalfootprintthe informationabout a particularperson that existson the internet asa result of theironline activity.DigitalCitizenshipacting safely,responsibly,andrespectfullyonlinedigitalliteracyhaving the skills you needto live, learn, and work in asociety wherecommunication and accessto information isincreasingly through digitaltechnologies like internetplatforms, social media,and mobile devices.cyberbullyingused to describe onlineharassment, which can bein the form of flames,comments made in chatrooms, the sending ofoffensive or cruel e-mail, oreven harassing others byposting on blogs, Webpages or social networkingsitessocialmediaprovides a virtualcommunity forpeople interested ina common subjector just a place tosocialize with othersonlinedigitaletiquettetheconventionsof being aresponsibleonline citizentrollonline commenterwhose intent is to todeliberately postsomething offensive toprovoke a reaction byattacking viewsexpressed online;these attacks are oftenpersonalprotectProtect Your PersonalInformation Online:Create strong passwords.Don't overshare on socialmedia.Use free Wi-Fi with caution.Watch out for links andattachments.Check to see if the site issecure.medialiteracyskills requiredto find,evaluate, use,share, andcreate contentonlineURLUniformResourceLocator, or“address” fora web page.phishingsending email thatattempts to scam theuser into giving upprivate information tobe used for identitytheftpasswordsecret series ofnumbers or lettersthat allows you toaccess a lockedcomputer orprogramDMdirect message, onTwitter or other socialmedia platform. DMsallow a user to directlycontact another user,without the messagesbeing seen in a publicforumplagiarismthe practice oftaking someoneelse's work orideas and passingthem off as one'sown.fakenewsfalseinformationpublished asbeingauthentic

Digital Citizenship Vocabulary - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
  1. personal information includes your likes and dislikes. PRIVATE information includes things that can identify you (full name, phone number, address, birthday)
    personal information
  2. sensationalist headline or link to an article, blog, or other Internet content that exists for the purpose of attracting attention, or “drawing clicks.” Once a user clicks on the headline or image, the website is often mostly ads.
    clickbait
  3. someone who recognizes when something is wrong and does something to make it right. If an upstander sees or hears about bullying, he or she will do something. This could mean stopping the bully, reporting the event, or otherwise helping the vict
    upstander
  4. personal information includes your likes and dislikes. PRIVATE information includes things that can identify you (full name, phone number, address, birthday)
    personal/private information
  5. small file that some websites attach to a user’s hard drive while the user is browsing that site; they can be used to track user preferences, speed loading times, and for advertising.
    cookie
  6. the information about a particular person that exists on the internet as a result of their online activity.
    digital footprint
  7. acting safely, responsibly, and respectfully online
    Digital Citizenship
  8. having the skills you need to live, learn, and work in a society where communication and access to information is increasingly through digital technologies like internet platforms, social media, and mobile devices.
    digital literacy
  9. used to describe online harassment, which can be in the form of flames, comments made in chat rooms, the sending of offensive or cruel e-mail, or even harassing others by posting on blogs, Web pages or social networking sites
    cyberbullying
  10. provides a virtual community for people interested in a common subject or just a place to socialize with others online
    social media
  11. the conventions of being a responsible online citizen
    digital etiquette
  12. online commenter whose intent is to to deliberately post something offensive to provoke a reaction by attacking views expressed online; these attacks are often personal
    troll
  13. Protect Your Personal Information Online: Create strong passwords. Don't overshare on social media. Use free Wi-Fi with caution. Watch out for links and attachments. Check to see if the site is secure.
    protect
  14. skills required to find, evaluate, use, share, and create content online
    media literacy
  15. Uniform Resource Locator, or “address” for a web page.
    URL
  16. sending email that attempts to scam the user into giving up private information to be used for identity theft
    phishing
  17. secret series of numbers or letters that allows you to access a locked computer or program
    password
  18. direct message, on Twitter or other social media platform. DMs allow a user to directly contact another user, without the messages being seen in a public forum
    DM
  19. the practice of taking someone else's work or ideas and passing them off as one's own.
    plagiarism
  20. false information published as being authentic
    fake news