MalwarePrograms thatare designedto damagecomputersand networksFirewallPart of acomputernetwork which isdesigned to blockunauthorizedaccessDigitalFootprintTrail of dataleft behindwhen peopleuse theinternetEmailOnline methodof sendingletters anddocuments toothersTargetSomeonewho is avictim of acyberbullySocialMediaWebsites suchas Facebook,Instagram,TikTok, orTwitter/XWebsiteAddressEmojisSmall picturesand smiliesused in textmessagesand emailNetiquetteStandards orrules thatdefine how weshould behavewhile onlineHomepageThe firstor mainpage of awebsite.HackerPerson whogets in tocomputersystems todamage themTextMessagesShort writtencommunications,usually throughcellphonesIdentityTheftUsingsomeoneelse's privateidentifyinginformationAnonymousNotidentifiedby nameAcceptableUse PolicyContractstudents signspledging thatthey will be gooddigital citizens atschoolUpstanderSomeonewho supportsothers and isagainstbullyingUploadAct of sendingdata ordocuments toanothercomputer orserverHardwareThephysicalparts of acomputerKeywordsSpecific termsused whennarrowingdown a searchon the Internet.DownloadAct of gettingdata fromsomeone else'scomputer toyoursHoaxA fake story,lie, or rumorthatcirculates onthe internetBrowserProgram thatallows us toview contenton theInternetPlagiarismUsingsomeone'swork andclaiming themas your own.PasswordSecretcombination ofletters, numbers,and symbolsused to protectone's dataCopyrightLaw thatprotects therights ofauthors andcreators of theirworkBystanderA person whodoes nothingwhen theyknow about orsee bullyingSoftwareThe programson a computerthat tell thehardwarewhat to doCyberbullySomeonewho is mean,bothers orharassesothers online.ReliableWebsites thathave accurateinformationare known asthisSpamIrrelevant orinappropriatemessages sentto a largenumber ofpeoplePhishingSending emailsintended to getother people toreveal personalinformationFlamingTerm meaningwhen someoneuses meanwords to attackanother persononline.MalwarePrograms thatare designedto damagecomputersand networksFirewallPart of acomputernetwork which isdesigned to blockunauthorizedaccessDigitalFootprintTrail of dataleft behindwhen peopleuse theinternetEmailOnline methodof sendingletters anddocuments toothersTargetSomeonewho is avictim of acyberbullySocialMediaWebsites suchas Facebook,Instagram,TikTok, orTwitter/XWebsiteAddressEmojisSmall picturesand smiliesused in textmessagesand emailNetiquetteStandards orrules thatdefine how weshould behavewhile onlineHomepageThe firstor mainpage of awebsite.HackerPerson whogets in tocomputersystems todamage themTextMessagesShort writtencommunications,usually throughcellphonesIdentityTheftUsingsomeoneelse's privateidentifyinginformationAnonymousNotidentifiedby nameAcceptableUse PolicyContractstudents signspledging thatthey will be gooddigital citizens atschoolUpstanderSomeonewho supportsothers and isagainstbullyingUploadAct of sendingdata ordocuments toanothercomputer orserverHardwareThephysicalparts of acomputerKeywordsSpecific termsused whennarrowingdown a searchon the Internet.DownloadAct of gettingdata fromsomeone else'scomputer toyoursHoaxA fake story,lie, or rumorthatcirculates onthe internetBrowserProgram thatallows us toview contenton theInternetPlagiarismUsingsomeone'swork andclaiming themas your own.PasswordSecretcombination ofletters, numbers,and symbolsused to protectone's dataCopyrightLaw thatprotects therights ofauthors andcreators of theirworkBystanderA person whodoes nothingwhen theyknow about orsee bullyingSoftwareThe programson a computerthat tell thehardwarewhat to doCyberbullySomeonewho is mean,bothers orharassesothers online.ReliableWebsites thathave accurateinformationare known asthisSpamIrrelevant orinappropriatemessages sentto a largenumber ofpeoplePhishingSending emailsintended to getother people toreveal personalinformationFlamingTerm meaningwhen someoneuses meanwords to attackanother persononline.

Digital Citizenship Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
  1. Programs that are designed to damage computers and networks
    Malware
  2. Part of a computer network which is designed to block unauthorized access
    Firewall
  3. Trail of data left behind when people use the internet
    Digital Footprint
  4. Online method of sending letters and documents to others
    Email
  5. Someone who is a victim of a cyberbully
    Target
  6. Websites such as Facebook, Instagram, TikTok, or Twitter/X
    Social Media
  7. Website Address
  8. Small pictures and smilies used in text messages and email
    Emojis
  9. Standards or rules that define how we should behave while online
    Netiquette
  10. The first or main page of a website.
    Homepage
  11. Person who gets in to computer systems to damage them
    Hacker
  12. Short written communications, usually through cellphones
    Text Messages
  13. Using someone else's private identifying information
    Identity Theft
  14. Not identified by name
    Anonymous
  15. Contract students signs pledging that they will be good digital citizens at school
    Acceptable Use Policy
  16. Someone who supports others and is against bullying
    Upstander
  17. Act of sending data or documents to another computer or server
    Upload
  18. The physical parts of a computer
    Hardware
  19. Specific terms used when narrowing down a search on the Internet.
    Keywords
  20. Act of getting data from someone else's computer to yours
    Download
  21. A fake story, lie, or rumor that circulates on the internet
    Hoax
  22. Program that allows us to view content on the Internet
    Browser
  23. Using someone's work and claiming them as your own.
    Plagiarism
  24. Secret combination of letters, numbers, and symbols used to protect one's data
    Password
  25. Law that protects the rights of authors and creators of their work
    Copyright
  26. A person who does nothing when they know about or see bullying
    Bystander
  27. The programs on a computer that tell the hardware what to do
    Software
  28. Someone who is mean, bothers or harasses others online.
    Cyberbully
  29. Websites that have accurate information are known as this
    Reliable
  30. Irrelevant or inappropriate messages sent to a large number of people
    Spam
  31. Sending emails intended to get other people to reveal personal information
    Phishing
  32. Term meaning when someone uses mean words to attack another person online.
    Flaming