AnonymousNotidentifiedby namePhishingSending emailsintended to getother people toreveal personalinformationUpstanderSomeonewho supportsothers and isagainstbullyingCopyrightLaw thatprotects therights ofauthors andcreators of theirworkSoftwareThe programson a computerthat tell thehardwarewhat to doBrowserProgram thatallows us toview contenton theInternetIdentityTheftUsingsomeoneelse's privateidentifyinginformationBystanderA person whodoes nothingwhen theyknow about orsee bullyingSocialMediaWebsites suchas Facebook,Instagram,TikTok, orTwitter/XCyberbullySomeonewho is mean,bothers orharassesothers online.HardwareThephysicalparts of acomputerEmojisSmall picturesand smiliesused in textmessagesand emailFlamingTerm meaningwhen someoneuses meanwords to attackanother persononline.AcceptableUse PolicyContractstudents signspledging thatthey will be gooddigital citizens atschoolTextMessagesShort writtencommunications,usually throughcellphonesDownloadAct of gettingdata fromsomeone else'scomputer toyoursHomepageThe firstor mainpage of awebsite.SpamIrrelevant orinappropriatemessages sentto a largenumber ofpeopleUploadAct of sendingdata ordocuments toanothercomputer orserverHackerPerson whogets in tocomputersystems todamage themHoaxA fake story,lie, or rumorthatcirculates onthe internetPasswordSecretcombination ofletters, numbers,and symbolsused to protectone's dataEmailOnline methodof sendingletters anddocuments toothersTargetSomeonewho is avictim of acyberbullyReliableWebsites thathave accurateinformationare known asthisDigitalFootprintTrail of dataleft behindwhen peopleuse theinternetFirewallPart of acomputernetwork which isdesigned to blockunauthorizedaccessPlagiarismUsingsomeone'swork andclaiming themas your own.MalwarePrograms thatare designedto damagecomputersand networksNetiquetteStandards orrules thatdefine how weshould behavewhile onlineWebsiteAddressKeywordsSpecific termsused whennarrowingdown a searchon the Internet.AnonymousNotidentifiedby namePhishingSending emailsintended to getother people toreveal personalinformationUpstanderSomeonewho supportsothers and isagainstbullyingCopyrightLaw thatprotects therights ofauthors andcreators of theirworkSoftwareThe programson a computerthat tell thehardwarewhat to doBrowserProgram thatallows us toview contenton theInternetIdentityTheftUsingsomeoneelse's privateidentifyinginformationBystanderA person whodoes nothingwhen theyknow about orsee bullyingSocialMediaWebsites suchas Facebook,Instagram,TikTok, orTwitter/XCyberbullySomeonewho is mean,bothers orharassesothers online.HardwareThephysicalparts of acomputerEmojisSmall picturesand smiliesused in textmessagesand emailFlamingTerm meaningwhen someoneuses meanwords to attackanother persononline.AcceptableUse PolicyContractstudents signspledging thatthey will be gooddigital citizens atschoolTextMessagesShort writtencommunications,usually throughcellphonesDownloadAct of gettingdata fromsomeone else'scomputer toyoursHomepageThe firstor mainpage of awebsite.SpamIrrelevant orinappropriatemessages sentto a largenumber ofpeopleUploadAct of sendingdata ordocuments toanothercomputer orserverHackerPerson whogets in tocomputersystems todamage themHoaxA fake story,lie, or rumorthatcirculates onthe internetPasswordSecretcombination ofletters, numbers,and symbolsused to protectone's dataEmailOnline methodof sendingletters anddocuments toothersTargetSomeonewho is avictim of acyberbullyReliableWebsites thathave accurateinformationare known asthisDigitalFootprintTrail of dataleft behindwhen peopleuse theinternetFirewallPart of acomputernetwork which isdesigned to blockunauthorizedaccessPlagiarismUsingsomeone'swork andclaiming themas your own.MalwarePrograms thatare designedto damagecomputersand networksNetiquetteStandards orrules thatdefine how weshould behavewhile onlineWebsiteAddressKeywordsSpecific termsused whennarrowingdown a searchon the Internet.

Digital Citizenship Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
  1. Not identified by name
    Anonymous
  2. Sending emails intended to get other people to reveal personal information
    Phishing
  3. Someone who supports others and is against bullying
    Upstander
  4. Law that protects the rights of authors and creators of their work
    Copyright
  5. The programs on a computer that tell the hardware what to do
    Software
  6. Program that allows us to view content on the Internet
    Browser
  7. Using someone else's private identifying information
    Identity Theft
  8. A person who does nothing when they know about or see bullying
    Bystander
  9. Websites such as Facebook, Instagram, TikTok, or Twitter/X
    Social Media
  10. Someone who is mean, bothers or harasses others online.
    Cyberbully
  11. The physical parts of a computer
    Hardware
  12. Small pictures and smilies used in text messages and email
    Emojis
  13. Term meaning when someone uses mean words to attack another person online.
    Flaming
  14. Contract students signs pledging that they will be good digital citizens at school
    Acceptable Use Policy
  15. Short written communications, usually through cellphones
    Text Messages
  16. Act of getting data from someone else's computer to yours
    Download
  17. The first or main page of a website.
    Homepage
  18. Irrelevant or inappropriate messages sent to a large number of people
    Spam
  19. Act of sending data or documents to another computer or server
    Upload
  20. Person who gets in to computer systems to damage them
    Hacker
  21. A fake story, lie, or rumor that circulates on the internet
    Hoax
  22. Secret combination of letters, numbers, and symbols used to protect one's data
    Password
  23. Online method of sending letters and documents to others
    Email
  24. Someone who is a victim of a cyberbully
    Target
  25. Websites that have accurate information are known as this
    Reliable
  26. Trail of data left behind when people use the internet
    Digital Footprint
  27. Part of a computer network which is designed to block unauthorized access
    Firewall
  28. Using someone's work and claiming them as your own.
    Plagiarism
  29. Programs that are designed to damage computers and networks
    Malware
  30. Standards or rules that define how we should behave while online
    Netiquette
  31. Website Address
  32. Specific terms used when narrowing down a search on the Internet.
    Keywords