HackerPerson whogets in tocomputersystems todamage themUploadAct of sendingdata ordocuments toanothercomputer orserverDigitalFootprintTrail of dataleft behindwhen peopleuse theinternetSpamIrrelevant orinappropriatemessages sentto a largenumber ofpeopleMalwarePrograms thatare designedto damagecomputersand networksWebsiteAddressHomepageThe firstor mainpage of awebsite.AcceptableUse PolicyContractstudents signspledging thatthey will be gooddigital citizens atschoolReliableWebsites thathave accurateinformationare known asthisFirewallPart of acomputernetwork which isdesigned to blockunauthorizedaccessDownloadAct of gettingdata fromsomeone else'scomputer toyoursEmailOnline methodof sendingletters anddocuments toothersHoaxA fake story,lie, or rumorthatcirculates onthe internetUpstanderSomeonewho supportsothers and isagainstbullyingEmojisSmall picturesand smiliesused in textmessagesand emailPhishingSending emailsintended to getother people toreveal personalinformationSocialMediaWebsites suchas Facebook,Instagram,TikTok, orTwitter/XNetiquetteStandards orrules thatdefine how weshould behavewhile onlineCopyrightLaw thatprotects therights ofauthors andcreators of theirworkHardwareThephysicalparts of acomputerBrowserProgram thatallows us toview contenton theInternetPlagiarismUsingsomeone'swork andclaiming themas your own.KeywordsSpecific termsused whennarrowingdown a searchon the Internet.IdentityTheftUsingsomeoneelse's privateidentifyinginformationTextMessagesShort writtencommunications,usually throughcellphonesTargetSomeonewho is avictim of acyberbullyBystanderA person whodoes nothingwhen theyknow about orsee bullyingAnonymousNotidentifiedby nameFlamingTerm meaningwhen someoneuses meanwords to attackanother persononline.PasswordSecretcombination ofletters, numbers,and symbolsused to protectone's dataCyberbullySomeonewho is mean,bothers orharassesothers online.SoftwareThe programson a computerthat tell thehardwarewhat to doHackerPerson whogets in tocomputersystems todamage themUploadAct of sendingdata ordocuments toanothercomputer orserverDigitalFootprintTrail of dataleft behindwhen peopleuse theinternetSpamIrrelevant orinappropriatemessages sentto a largenumber ofpeopleMalwarePrograms thatare designedto damagecomputersand networksWebsiteAddressHomepageThe firstor mainpage of awebsite.AcceptableUse PolicyContractstudents signspledging thatthey will be gooddigital citizens atschoolReliableWebsites thathave accurateinformationare known asthisFirewallPart of acomputernetwork which isdesigned to blockunauthorizedaccessDownloadAct of gettingdata fromsomeone else'scomputer toyoursEmailOnline methodof sendingletters anddocuments toothersHoaxA fake story,lie, or rumorthatcirculates onthe internetUpstanderSomeonewho supportsothers and isagainstbullyingEmojisSmall picturesand smiliesused in textmessagesand emailPhishingSending emailsintended to getother people toreveal personalinformationSocialMediaWebsites suchas Facebook,Instagram,TikTok, orTwitter/XNetiquetteStandards orrules thatdefine how weshould behavewhile onlineCopyrightLaw thatprotects therights ofauthors andcreators of theirworkHardwareThephysicalparts of acomputerBrowserProgram thatallows us toview contenton theInternetPlagiarismUsingsomeone'swork andclaiming themas your own.KeywordsSpecific termsused whennarrowingdown a searchon the Internet.IdentityTheftUsingsomeoneelse's privateidentifyinginformationTextMessagesShort writtencommunications,usually throughcellphonesTargetSomeonewho is avictim of acyberbullyBystanderA person whodoes nothingwhen theyknow about orsee bullyingAnonymousNotidentifiedby nameFlamingTerm meaningwhen someoneuses meanwords to attackanother persononline.PasswordSecretcombination ofletters, numbers,and symbolsused to protectone's dataCyberbullySomeonewho is mean,bothers orharassesothers online.SoftwareThe programson a computerthat tell thehardwarewhat to do

Digital Citizenship Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
  1. Person who gets in to computer systems to damage them
    Hacker
  2. Act of sending data or documents to another computer or server
    Upload
  3. Trail of data left behind when people use the internet
    Digital Footprint
  4. Irrelevant or inappropriate messages sent to a large number of people
    Spam
  5. Programs that are designed to damage computers and networks
    Malware
  6. Website Address
  7. The first or main page of a website.
    Homepage
  8. Contract students signs pledging that they will be good digital citizens at school
    Acceptable Use Policy
  9. Websites that have accurate information are known as this
    Reliable
  10. Part of a computer network which is designed to block unauthorized access
    Firewall
  11. Act of getting data from someone else's computer to yours
    Download
  12. Online method of sending letters and documents to others
    Email
  13. A fake story, lie, or rumor that circulates on the internet
    Hoax
  14. Someone who supports others and is against bullying
    Upstander
  15. Small pictures and smilies used in text messages and email
    Emojis
  16. Sending emails intended to get other people to reveal personal information
    Phishing
  17. Websites such as Facebook, Instagram, TikTok, or Twitter/X
    Social Media
  18. Standards or rules that define how we should behave while online
    Netiquette
  19. Law that protects the rights of authors and creators of their work
    Copyright
  20. The physical parts of a computer
    Hardware
  21. Program that allows us to view content on the Internet
    Browser
  22. Using someone's work and claiming them as your own.
    Plagiarism
  23. Specific terms used when narrowing down a search on the Internet.
    Keywords
  24. Using someone else's private identifying information
    Identity Theft
  25. Short written communications, usually through cellphones
    Text Messages
  26. Someone who is a victim of a cyberbully
    Target
  27. A person who does nothing when they know about or see bullying
    Bystander
  28. Not identified by name
    Anonymous
  29. Term meaning when someone uses mean words to attack another person online.
    Flaming
  30. Secret combination of letters, numbers, and symbols used to protect one's data
    Password
  31. Someone who is mean, bothers or harasses others online.
    Cyberbully
  32. The programs on a computer that tell the hardware what to do
    Software