CopyrightLaw thatprotects therights ofauthors andcreators of theirworkReliableWebsites thathave accurateinformationare known asthisWebsiteAddressCyberbullySomeonewho is mean,bothers orharassesothers online.PhishingSending emailsintended to getother people toreveal personalinformationHardwareThephysicalparts of acomputerEmailOnline methodof sendingletters anddocuments toothersIdentityTheftUsingsomeoneelse's privateidentifyinginformationFlamingTerm meaningwhen someoneuses meanwords to attackanother persononline.TextMessagesShort writtencommunications,usually throughcellphonesEmojisSmall picturesand smiliesused in textmessagesand emailBystanderA person whodoes nothingwhen theyknow about orsee bullyingAcceptableUse PolicyContractstudents signspledging thatthey will be gooddigital citizens atschoolSpamIrrelevant orinappropriatemessages sentto a largenumber ofpeopleSocialMediaWebsites suchas Facebook,Instagram,TikTok, orTwitter/XBrowserProgram thatallows us toview contenton theInternetHomepageThe firstor mainpage of awebsite.PlagiarismUsingsomeone'swork andclaiming themas your own.FirewallPart of acomputernetwork which isdesigned to blockunauthorizedaccessHoaxA fake story,lie, or rumorthatcirculates onthe internetPasswordSecretcombination ofletters, numbers,and symbolsused to protectone's dataSoftwareThe programson a computerthat tell thehardwarewhat to doHackerPerson whogets in tocomputersystems todamage themAnonymousNotidentifiedby nameMalwarePrograms thatare designedto damagecomputersand networksUpstanderSomeonewho supportsothers and isagainstbullyingDigitalFootprintTrail of dataleft behindwhen peopleuse theinternetKeywordsSpecific termsused whennarrowingdown a searchon the Internet.TargetSomeonewho is avictim of acyberbullyDownloadAct of gettingdata fromsomeone else'scomputer toyoursNetiquetteStandards orrules thatdefine how weshould behavewhile onlineUploadAct of sendingdata ordocuments toanothercomputer orserverCopyrightLaw thatprotects therights ofauthors andcreators of theirworkReliableWebsites thathave accurateinformationare known asthisWebsiteAddressCyberbullySomeonewho is mean,bothers orharassesothers online.PhishingSending emailsintended to getother people toreveal personalinformationHardwareThephysicalparts of acomputerEmailOnline methodof sendingletters anddocuments toothersIdentityTheftUsingsomeoneelse's privateidentifyinginformationFlamingTerm meaningwhen someoneuses meanwords to attackanother persononline.TextMessagesShort writtencommunications,usually throughcellphonesEmojisSmall picturesand smiliesused in textmessagesand emailBystanderA person whodoes nothingwhen theyknow about orsee bullyingAcceptableUse PolicyContractstudents signspledging thatthey will be gooddigital citizens atschoolSpamIrrelevant orinappropriatemessages sentto a largenumber ofpeopleSocialMediaWebsites suchas Facebook,Instagram,TikTok, orTwitter/XBrowserProgram thatallows us toview contenton theInternetHomepageThe firstor mainpage of awebsite.PlagiarismUsingsomeone'swork andclaiming themas your own.FirewallPart of acomputernetwork which isdesigned to blockunauthorizedaccessHoaxA fake story,lie, or rumorthatcirculates onthe internetPasswordSecretcombination ofletters, numbers,and symbolsused to protectone's dataSoftwareThe programson a computerthat tell thehardwarewhat to doHackerPerson whogets in tocomputersystems todamage themAnonymousNotidentifiedby nameMalwarePrograms thatare designedto damagecomputersand networksUpstanderSomeonewho supportsothers and isagainstbullyingDigitalFootprintTrail of dataleft behindwhen peopleuse theinternetKeywordsSpecific termsused whennarrowingdown a searchon the Internet.TargetSomeonewho is avictim of acyberbullyDownloadAct of gettingdata fromsomeone else'scomputer toyoursNetiquetteStandards orrules thatdefine how weshould behavewhile onlineUploadAct of sendingdata ordocuments toanothercomputer orserver

Digital Citizenship Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
  1. Law that protects the rights of authors and creators of their work
    Copyright
  2. Websites that have accurate information are known as this
    Reliable
  3. Website Address
  4. Someone who is mean, bothers or harasses others online.
    Cyberbully
  5. Sending emails intended to get other people to reveal personal information
    Phishing
  6. The physical parts of a computer
    Hardware
  7. Online method of sending letters and documents to others
    Email
  8. Using someone else's private identifying information
    Identity Theft
  9. Term meaning when someone uses mean words to attack another person online.
    Flaming
  10. Short written communications, usually through cellphones
    Text Messages
  11. Small pictures and smilies used in text messages and email
    Emojis
  12. A person who does nothing when they know about or see bullying
    Bystander
  13. Contract students signs pledging that they will be good digital citizens at school
    Acceptable Use Policy
  14. Irrelevant or inappropriate messages sent to a large number of people
    Spam
  15. Websites such as Facebook, Instagram, TikTok, or Twitter/X
    Social Media
  16. Program that allows us to view content on the Internet
    Browser
  17. The first or main page of a website.
    Homepage
  18. Using someone's work and claiming them as your own.
    Plagiarism
  19. Part of a computer network which is designed to block unauthorized access
    Firewall
  20. A fake story, lie, or rumor that circulates on the internet
    Hoax
  21. Secret combination of letters, numbers, and symbols used to protect one's data
    Password
  22. The programs on a computer that tell the hardware what to do
    Software
  23. Person who gets in to computer systems to damage them
    Hacker
  24. Not identified by name
    Anonymous
  25. Programs that are designed to damage computers and networks
    Malware
  26. Someone who supports others and is against bullying
    Upstander
  27. Trail of data left behind when people use the internet
    Digital Footprint
  28. Specific terms used when narrowing down a search on the Internet.
    Keywords
  29. Someone who is a victim of a cyberbully
    Target
  30. Act of getting data from someone else's computer to yours
    Download
  31. Standards or rules that define how we should behave while online
    Netiquette
  32. Act of sending data or documents to another computer or server
    Upload