SocialMediaWebsites suchas Facebook,Instagram,TikTok, orTwitter/XIdentityTheftUsingsomeoneelse's privateidentifyinginformationCopyrightLaw thatprotects therights ofauthors andcreators of theirworkFirewallPart of acomputernetwork which isdesigned to blockunauthorizedaccessAnonymousNotidentifiedby nameDigitalFootprintTrail of dataleft behindwhen peopleuse theinternetHardwareThephysicalparts of acomputerFlamingTerm meaningwhen someoneuses meanwords to attackanother persononline.BystanderA person whodoes nothingwhen theyknow about orsee bullyingTargetSomeonewho is avictim of acyberbullyMalwarePrograms thatare designedto damagecomputersand networksSpamIrrelevant orinappropriatemessages sentto a largenumber ofpeopleSoftwareThe programson a computerthat tell thehardwarewhat to doUpstanderSomeonewho supportsothers and isagainstbullyingBrowserProgram thatallows us toview contenton theInternetHomepageThe firstor mainpage of awebsite.EmojisSmall picturesand smiliesused in textmessagesand emailAcceptableUse PolicyContractstudents signspledging thatthey will be gooddigital citizens atschoolTextMessagesShort writtencommunications,usually throughcellphonesNetiquetteStandards orrules thatdefine how weshould behavewhile onlineCyberbullySomeonewho is mean,bothers orharassesothers online.HoaxA fake story,lie, or rumorthatcirculates onthe internetPhishingSending emailsintended to getother people toreveal personalinformationPasswordSecretcombination ofletters, numbers,and symbolsused to protectone's dataDownloadAct of gettingdata fromsomeone else'scomputer toyoursPlagiarismUsingsomeone'swork andclaiming themas your own.EmailOnline methodof sendingletters anddocuments toothersKeywordsSpecific termsused whennarrowingdown a searchon the Internet.HackerPerson whogets in tocomputersystems todamage themReliableWebsites thathave accurateinformationare known asthisUploadAct of sendingdata ordocuments toanothercomputer orserverWebsiteAddressSocialMediaWebsites suchas Facebook,Instagram,TikTok, orTwitter/XIdentityTheftUsingsomeoneelse's privateidentifyinginformationCopyrightLaw thatprotects therights ofauthors andcreators of theirworkFirewallPart of acomputernetwork which isdesigned to blockunauthorizedaccessAnonymousNotidentifiedby nameDigitalFootprintTrail of dataleft behindwhen peopleuse theinternetHardwareThephysicalparts of acomputerFlamingTerm meaningwhen someoneuses meanwords to attackanother persononline.BystanderA person whodoes nothingwhen theyknow about orsee bullyingTargetSomeonewho is avictim of acyberbullyMalwarePrograms thatare designedto damagecomputersand networksSpamIrrelevant orinappropriatemessages sentto a largenumber ofpeopleSoftwareThe programson a computerthat tell thehardwarewhat to doUpstanderSomeonewho supportsothers and isagainstbullyingBrowserProgram thatallows us toview contenton theInternetHomepageThe firstor mainpage of awebsite.EmojisSmall picturesand smiliesused in textmessagesand emailAcceptableUse PolicyContractstudents signspledging thatthey will be gooddigital citizens atschoolTextMessagesShort writtencommunications,usually throughcellphonesNetiquetteStandards orrules thatdefine how weshould behavewhile onlineCyberbullySomeonewho is mean,bothers orharassesothers online.HoaxA fake story,lie, or rumorthatcirculates onthe internetPhishingSending emailsintended to getother people toreveal personalinformationPasswordSecretcombination ofletters, numbers,and symbolsused to protectone's dataDownloadAct of gettingdata fromsomeone else'scomputer toyoursPlagiarismUsingsomeone'swork andclaiming themas your own.EmailOnline methodof sendingletters anddocuments toothersKeywordsSpecific termsused whennarrowingdown a searchon the Internet.HackerPerson whogets in tocomputersystems todamage themReliableWebsites thathave accurateinformationare known asthisUploadAct of sendingdata ordocuments toanothercomputer orserverWebsiteAddress

Digital Citizenship Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
  1. Websites such as Facebook, Instagram, TikTok, or Twitter/X
    Social Media
  2. Using someone else's private identifying information
    Identity Theft
  3. Law that protects the rights of authors and creators of their work
    Copyright
  4. Part of a computer network which is designed to block unauthorized access
    Firewall
  5. Not identified by name
    Anonymous
  6. Trail of data left behind when people use the internet
    Digital Footprint
  7. The physical parts of a computer
    Hardware
  8. Term meaning when someone uses mean words to attack another person online.
    Flaming
  9. A person who does nothing when they know about or see bullying
    Bystander
  10. Someone who is a victim of a cyberbully
    Target
  11. Programs that are designed to damage computers and networks
    Malware
  12. Irrelevant or inappropriate messages sent to a large number of people
    Spam
  13. The programs on a computer that tell the hardware what to do
    Software
  14. Someone who supports others and is against bullying
    Upstander
  15. Program that allows us to view content on the Internet
    Browser
  16. The first or main page of a website.
    Homepage
  17. Small pictures and smilies used in text messages and email
    Emojis
  18. Contract students signs pledging that they will be good digital citizens at school
    Acceptable Use Policy
  19. Short written communications, usually through cellphones
    Text Messages
  20. Standards or rules that define how we should behave while online
    Netiquette
  21. Someone who is mean, bothers or harasses others online.
    Cyberbully
  22. A fake story, lie, or rumor that circulates on the internet
    Hoax
  23. Sending emails intended to get other people to reveal personal information
    Phishing
  24. Secret combination of letters, numbers, and symbols used to protect one's data
    Password
  25. Act of getting data from someone else's computer to yours
    Download
  26. Using someone's work and claiming them as your own.
    Plagiarism
  27. Online method of sending letters and documents to others
    Email
  28. Specific terms used when narrowing down a search on the Internet.
    Keywords
  29. Person who gets in to computer systems to damage them
    Hacker
  30. Websites that have accurate information are known as this
    Reliable
  31. Act of sending data or documents to another computer or server
    Upload
  32. Website Address