PlagiarismUsingsomeone'swork andclaiming themas your own.KeywordsSpecific termsused whennarrowingdown a searchon the Internet.PasswordSecretcombination ofletters, numbers,and symbolsused to protectone's dataIdentityTheftUsingsomeoneelse's privateidentifyinginformationWebsiteAddressAnonymousNotidentifiedby nameSocialMediaWebsites suchas Facebook,Instagram,TikTok, orTwitter/XBrowserProgram thatallows us toview contenton theInternetUpstanderSomeonewho supportsothers and isagainstbullyingDownloadAct of gettingdata fromsomeone else'scomputer toyoursNetiquetteStandards orrules thatdefine how weshould behavewhile onlineHomepageThe firstor mainpage of awebsite.ReliableWebsites thathave accurateinformationare known asthisAcceptableUse PolicyContractstudents signspledging thatthey will be gooddigital citizens atschoolHackerPerson whogets in tocomputersystems todamage themHardwareThephysicalparts of acomputerEmojisSmall picturesand smiliesused in textmessagesand emailCyberbullySomeonewho is mean,bothers orharassesothers online.MalwarePrograms thatare designedto damagecomputersand networksHoaxA fake story,lie, or rumorthatcirculates onthe internetTargetSomeonewho is avictim of acyberbullyEmailOnline methodof sendingletters anddocuments toothersCopyrightLaw thatprotects therights ofauthors andcreators of theirworkDigitalFootprintTrail of dataleft behindwhen peopleuse theinternetSpamIrrelevant orinappropriatemessages sentto a largenumber ofpeopleTextMessagesShort writtencommunications,usually throughcellphonesPhishingSending emailsintended to getother people toreveal personalinformationBystanderA person whodoes nothingwhen theyknow about orsee bullyingSoftwareThe programson a computerthat tell thehardwarewhat to doUploadAct of sendingdata ordocuments toanothercomputer orserverFirewallPart of acomputernetwork which isdesigned to blockunauthorizedaccessFlamingTerm meaningwhen someoneuses meanwords to attackanother persononline.PlagiarismUsingsomeone'swork andclaiming themas your own.KeywordsSpecific termsused whennarrowingdown a searchon the Internet.PasswordSecretcombination ofletters, numbers,and symbolsused to protectone's dataIdentityTheftUsingsomeoneelse's privateidentifyinginformationWebsiteAddressAnonymousNotidentifiedby nameSocialMediaWebsites suchas Facebook,Instagram,TikTok, orTwitter/XBrowserProgram thatallows us toview contenton theInternetUpstanderSomeonewho supportsothers and isagainstbullyingDownloadAct of gettingdata fromsomeone else'scomputer toyoursNetiquetteStandards orrules thatdefine how weshould behavewhile onlineHomepageThe firstor mainpage of awebsite.ReliableWebsites thathave accurateinformationare known asthisAcceptableUse PolicyContractstudents signspledging thatthey will be gooddigital citizens atschoolHackerPerson whogets in tocomputersystems todamage themHardwareThephysicalparts of acomputerEmojisSmall picturesand smiliesused in textmessagesand emailCyberbullySomeonewho is mean,bothers orharassesothers online.MalwarePrograms thatare designedto damagecomputersand networksHoaxA fake story,lie, or rumorthatcirculates onthe internetTargetSomeonewho is avictim of acyberbullyEmailOnline methodof sendingletters anddocuments toothersCopyrightLaw thatprotects therights ofauthors andcreators of theirworkDigitalFootprintTrail of dataleft behindwhen peopleuse theinternetSpamIrrelevant orinappropriatemessages sentto a largenumber ofpeopleTextMessagesShort writtencommunications,usually throughcellphonesPhishingSending emailsintended to getother people toreveal personalinformationBystanderA person whodoes nothingwhen theyknow about orsee bullyingSoftwareThe programson a computerthat tell thehardwarewhat to doUploadAct of sendingdata ordocuments toanothercomputer orserverFirewallPart of acomputernetwork which isdesigned to blockunauthorizedaccessFlamingTerm meaningwhen someoneuses meanwords to attackanother persononline.

Digital Citizenship Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
  1. Using someone's work and claiming them as your own.
    Plagiarism
  2. Specific terms used when narrowing down a search on the Internet.
    Keywords
  3. Secret combination of letters, numbers, and symbols used to protect one's data
    Password
  4. Using someone else's private identifying information
    Identity Theft
  5. Website Address
  6. Not identified by name
    Anonymous
  7. Websites such as Facebook, Instagram, TikTok, or Twitter/X
    Social Media
  8. Program that allows us to view content on the Internet
    Browser
  9. Someone who supports others and is against bullying
    Upstander
  10. Act of getting data from someone else's computer to yours
    Download
  11. Standards or rules that define how we should behave while online
    Netiquette
  12. The first or main page of a website.
    Homepage
  13. Websites that have accurate information are known as this
    Reliable
  14. Contract students signs pledging that they will be good digital citizens at school
    Acceptable Use Policy
  15. Person who gets in to computer systems to damage them
    Hacker
  16. The physical parts of a computer
    Hardware
  17. Small pictures and smilies used in text messages and email
    Emojis
  18. Someone who is mean, bothers or harasses others online.
    Cyberbully
  19. Programs that are designed to damage computers and networks
    Malware
  20. A fake story, lie, or rumor that circulates on the internet
    Hoax
  21. Someone who is a victim of a cyberbully
    Target
  22. Online method of sending letters and documents to others
    Email
  23. Law that protects the rights of authors and creators of their work
    Copyright
  24. Trail of data left behind when people use the internet
    Digital Footprint
  25. Irrelevant or inappropriate messages sent to a large number of people
    Spam
  26. Short written communications, usually through cellphones
    Text Messages
  27. Sending emails intended to get other people to reveal personal information
    Phishing
  28. A person who does nothing when they know about or see bullying
    Bystander
  29. The programs on a computer that tell the hardware what to do
    Software
  30. Act of sending data or documents to another computer or server
    Upload
  31. Part of a computer network which is designed to block unauthorized access
    Firewall
  32. Term meaning when someone uses mean words to attack another person online.
    Flaming