AcceptableUse PolicyContractstudents signspledging thatthey will be gooddigital citizens atschoolMalwarePrograms thatare designedto damagecomputersand networksDigitalFootprintTrail of dataleft behindwhen peopleuse theinternetPhishingSending emailsintended to getother people toreveal personalinformationSpamIrrelevant orinappropriatemessages sentto a largenumber ofpeopleDownloadAct of gettingdata fromsomeone else'scomputer toyoursNetiquetteStandards orrules thatdefine how weshould behavewhile onlineEmailOnline methodof sendingletters anddocuments toothersSoftwareThe programson a computerthat tell thehardwarewhat to doReliableWebsites thathave accurateinformationare known asthisSocialMediaWebsites suchas Facebook,Instagram,TikTok, orTwitter/XUpstanderSomeonewho supportsothers and isagainstbullyingFirewallPart of acomputernetwork which isdesigned to blockunauthorizedaccessUploadAct of sendingdata ordocuments toanothercomputer orserverBystanderA person whodoes nothingwhen theyknow about orsee bullyingEmojisSmall picturesand smiliesused in textmessagesand emailPasswordSecretcombination ofletters, numbers,and symbolsused to protectone's dataHomepageThe firstor mainpage of awebsite.TargetSomeonewho is avictim of acyberbullyBrowserProgram thatallows us toview contenton theInternetPlagiarismUsingsomeone'swork andclaiming themas your own.TextMessagesShort writtencommunications,usually throughcellphonesFlamingTerm meaningwhen someoneuses meanwords to attackanother persononline.HardwareThephysicalparts of acomputerHoaxA fake story,lie, or rumorthatcirculates onthe internetHackerPerson whogets in tocomputersystems todamage themIdentityTheftUsingsomeoneelse's privateidentifyinginformationKeywordsSpecific termsused whennarrowingdown a searchon the Internet.WebsiteAddressAnonymousNotidentifiedby nameCopyrightLaw thatprotects therights ofauthors andcreators of theirworkCyberbullySomeonewho is mean,bothers orharassesothers online.AcceptableUse PolicyContractstudents signspledging thatthey will be gooddigital citizens atschoolMalwarePrograms thatare designedto damagecomputersand networksDigitalFootprintTrail of dataleft behindwhen peopleuse theinternetPhishingSending emailsintended to getother people toreveal personalinformationSpamIrrelevant orinappropriatemessages sentto a largenumber ofpeopleDownloadAct of gettingdata fromsomeone else'scomputer toyoursNetiquetteStandards orrules thatdefine how weshould behavewhile onlineEmailOnline methodof sendingletters anddocuments toothersSoftwareThe programson a computerthat tell thehardwarewhat to doReliableWebsites thathave accurateinformationare known asthisSocialMediaWebsites suchas Facebook,Instagram,TikTok, orTwitter/XUpstanderSomeonewho supportsothers and isagainstbullyingFirewallPart of acomputernetwork which isdesigned to blockunauthorizedaccessUploadAct of sendingdata ordocuments toanothercomputer orserverBystanderA person whodoes nothingwhen theyknow about orsee bullyingEmojisSmall picturesand smiliesused in textmessagesand emailPasswordSecretcombination ofletters, numbers,and symbolsused to protectone's dataHomepageThe firstor mainpage of awebsite.TargetSomeonewho is avictim of acyberbullyBrowserProgram thatallows us toview contenton theInternetPlagiarismUsingsomeone'swork andclaiming themas your own.TextMessagesShort writtencommunications,usually throughcellphonesFlamingTerm meaningwhen someoneuses meanwords to attackanother persononline.HardwareThephysicalparts of acomputerHoaxA fake story,lie, or rumorthatcirculates onthe internetHackerPerson whogets in tocomputersystems todamage themIdentityTheftUsingsomeoneelse's privateidentifyinginformationKeywordsSpecific termsused whennarrowingdown a searchon the Internet.WebsiteAddressAnonymousNotidentifiedby nameCopyrightLaw thatprotects therights ofauthors andcreators of theirworkCyberbullySomeonewho is mean,bothers orharassesothers online.

Digital Citizenship Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
  1. Contract students signs pledging that they will be good digital citizens at school
    Acceptable Use Policy
  2. Programs that are designed to damage computers and networks
    Malware
  3. Trail of data left behind when people use the internet
    Digital Footprint
  4. Sending emails intended to get other people to reveal personal information
    Phishing
  5. Irrelevant or inappropriate messages sent to a large number of people
    Spam
  6. Act of getting data from someone else's computer to yours
    Download
  7. Standards or rules that define how we should behave while online
    Netiquette
  8. Online method of sending letters and documents to others
    Email
  9. The programs on a computer that tell the hardware what to do
    Software
  10. Websites that have accurate information are known as this
    Reliable
  11. Websites such as Facebook, Instagram, TikTok, or Twitter/X
    Social Media
  12. Someone who supports others and is against bullying
    Upstander
  13. Part of a computer network which is designed to block unauthorized access
    Firewall
  14. Act of sending data or documents to another computer or server
    Upload
  15. A person who does nothing when they know about or see bullying
    Bystander
  16. Small pictures and smilies used in text messages and email
    Emojis
  17. Secret combination of letters, numbers, and symbols used to protect one's data
    Password
  18. The first or main page of a website.
    Homepage
  19. Someone who is a victim of a cyberbully
    Target
  20. Program that allows us to view content on the Internet
    Browser
  21. Using someone's work and claiming them as your own.
    Plagiarism
  22. Short written communications, usually through cellphones
    Text Messages
  23. Term meaning when someone uses mean words to attack another person online.
    Flaming
  24. The physical parts of a computer
    Hardware
  25. A fake story, lie, or rumor that circulates on the internet
    Hoax
  26. Person who gets in to computer systems to damage them
    Hacker
  27. Using someone else's private identifying information
    Identity Theft
  28. Specific terms used when narrowing down a search on the Internet.
    Keywords
  29. Website Address
  30. Not identified by name
    Anonymous
  31. Law that protects the rights of authors and creators of their work
    Copyright
  32. Someone who is mean, bothers or harasses others online.
    Cyberbully