FirewallPart of acomputernetwork which isdesigned to blockunauthorizedaccessUpstanderSomeonewho supportsothers and isagainstbullyingCopyrightLaw thatprotects therights ofauthors andcreators of theirworkHomepageThe firstor mainpage of awebsite.TargetSomeonewho is avictim of acyberbullyDigitalFootprintTrail of dataleft behindwhen peopleuse theinternetBystanderA person whodoes nothingwhen theyknow about orsee bullyingFlamingTerm meaningwhen someoneuses meanwords to attackanother persononline.AcceptableUse PolicyContractstudents signspledging thatthey will be gooddigital citizens atschoolBrowserProgram thatallows us toview contenton theInternetSoftwareThe programson a computerthat tell thehardwarewhat to doAnonymousNotidentifiedby nameTextMessagesShort writtencommunications,usually throughcellphonesDownloadAct of gettingdata fromsomeone else'scomputer toyoursUploadAct of sendingdata ordocuments toanothercomputer orserverPasswordSecretcombination ofletters, numbers,and symbolsused to protectone's dataCyberbullySomeonewho is mean,bothers orharassesothers online.HoaxA fake story,lie, or rumorthatcirculates onthe internetSpamIrrelevant orinappropriatemessages sentto a largenumber ofpeopleHardwareThephysicalparts of acomputerIdentityTheftUsingsomeoneelse's privateidentifyinginformationPlagiarismUsingsomeone'swork andclaiming themas your own.HackerPerson whogets in tocomputersystems todamage themEmojisSmall picturesand smiliesused in textmessagesand emailWebsiteAddressSocialMediaWebsites suchas Facebook,Instagram,TikTok, orTwitter/XPhishingSending emailsintended to getother people toreveal personalinformationEmailOnline methodof sendingletters anddocuments toothersMalwarePrograms thatare designedto damagecomputersand networksReliableWebsites thathave accurateinformationare known asthisKeywordsSpecific termsused whennarrowingdown a searchon the Internet.NetiquetteStandards orrules thatdefine how weshould behavewhile onlineFirewallPart of acomputernetwork which isdesigned to blockunauthorizedaccessUpstanderSomeonewho supportsothers and isagainstbullyingCopyrightLaw thatprotects therights ofauthors andcreators of theirworkHomepageThe firstor mainpage of awebsite.TargetSomeonewho is avictim of acyberbullyDigitalFootprintTrail of dataleft behindwhen peopleuse theinternetBystanderA person whodoes nothingwhen theyknow about orsee bullyingFlamingTerm meaningwhen someoneuses meanwords to attackanother persononline.AcceptableUse PolicyContractstudents signspledging thatthey will be gooddigital citizens atschoolBrowserProgram thatallows us toview contenton theInternetSoftwareThe programson a computerthat tell thehardwarewhat to doAnonymousNotidentifiedby nameTextMessagesShort writtencommunications,usually throughcellphonesDownloadAct of gettingdata fromsomeone else'scomputer toyoursUploadAct of sendingdata ordocuments toanothercomputer orserverPasswordSecretcombination ofletters, numbers,and symbolsused to protectone's dataCyberbullySomeonewho is mean,bothers orharassesothers online.HoaxA fake story,lie, or rumorthatcirculates onthe internetSpamIrrelevant orinappropriatemessages sentto a largenumber ofpeopleHardwareThephysicalparts of acomputerIdentityTheftUsingsomeoneelse's privateidentifyinginformationPlagiarismUsingsomeone'swork andclaiming themas your own.HackerPerson whogets in tocomputersystems todamage themEmojisSmall picturesand smiliesused in textmessagesand emailWebsiteAddressSocialMediaWebsites suchas Facebook,Instagram,TikTok, orTwitter/XPhishingSending emailsintended to getother people toreveal personalinformationEmailOnline methodof sendingletters anddocuments toothersMalwarePrograms thatare designedto damagecomputersand networksReliableWebsites thathave accurateinformationare known asthisKeywordsSpecific termsused whennarrowingdown a searchon the Internet.NetiquetteStandards orrules thatdefine how weshould behavewhile online

Digital Citizenship Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
  1. Part of a computer network which is designed to block unauthorized access
    Firewall
  2. Someone who supports others and is against bullying
    Upstander
  3. Law that protects the rights of authors and creators of their work
    Copyright
  4. The first or main page of a website.
    Homepage
  5. Someone who is a victim of a cyberbully
    Target
  6. Trail of data left behind when people use the internet
    Digital Footprint
  7. A person who does nothing when they know about or see bullying
    Bystander
  8. Term meaning when someone uses mean words to attack another person online.
    Flaming
  9. Contract students signs pledging that they will be good digital citizens at school
    Acceptable Use Policy
  10. Program that allows us to view content on the Internet
    Browser
  11. The programs on a computer that tell the hardware what to do
    Software
  12. Not identified by name
    Anonymous
  13. Short written communications, usually through cellphones
    Text Messages
  14. Act of getting data from someone else's computer to yours
    Download
  15. Act of sending data or documents to another computer or server
    Upload
  16. Secret combination of letters, numbers, and symbols used to protect one's data
    Password
  17. Someone who is mean, bothers or harasses others online.
    Cyberbully
  18. A fake story, lie, or rumor that circulates on the internet
    Hoax
  19. Irrelevant or inappropriate messages sent to a large number of people
    Spam
  20. The physical parts of a computer
    Hardware
  21. Using someone else's private identifying information
    Identity Theft
  22. Using someone's work and claiming them as your own.
    Plagiarism
  23. Person who gets in to computer systems to damage them
    Hacker
  24. Small pictures and smilies used in text messages and email
    Emojis
  25. Website Address
  26. Websites such as Facebook, Instagram, TikTok, or Twitter/X
    Social Media
  27. Sending emails intended to get other people to reveal personal information
    Phishing
  28. Online method of sending letters and documents to others
    Email
  29. Programs that are designed to damage computers and networks
    Malware
  30. Websites that have accurate information are known as this
    Reliable
  31. Specific terms used when narrowing down a search on the Internet.
    Keywords
  32. Standards or rules that define how we should behave while online
    Netiquette