PlagiarismUsingsomeone'swork andclaiming themas your own.HardwareThephysicalparts of acomputerBystanderA person whodoes nothingwhen theyknow about orsee bullyingMalwarePrograms thatare designedto damagecomputersand networksTextMessagesShort writtencommunications,usually throughcellphonesSpamIrrelevant orinappropriatemessages sentto a largenumber ofpeopleWebsiteAddressFirewallPart of acomputernetwork which isdesigned to blockunauthorizedaccessReliableWebsites thathave accurateinformationare known asthisFlamingTerm meaningwhen someoneuses meanwords to attackanother persononline.DigitalFootprintTrail of dataleft behindwhen peopleuse theinternetCopyrightLaw thatprotects therights ofauthors andcreators of theirworkSocialMediaWebsites suchas Facebook,Instagram,TikTok, orTwitter/XDownloadAct of gettingdata fromsomeone else'scomputer toyoursAnonymousNotidentifiedby nameIdentityTheftUsingsomeoneelse's privateidentifyinginformationUpstanderSomeonewho supportsothers and isagainstbullyingHackerPerson whogets in tocomputersystems todamage themPhishingSending emailsintended to getother people toreveal personalinformationTargetSomeonewho is avictim of acyberbullyHomepageThe firstor mainpage of awebsite.SoftwareThe programson a computerthat tell thehardwarewhat to doPasswordSecretcombination ofletters, numbers,and symbolsused to protectone's dataBrowserProgram thatallows us toview contenton theInternetCyberbullySomeonewho is mean,bothers orharassesothers online.NetiquetteStandards orrules thatdefine how weshould behavewhile onlineKeywordsSpecific termsused whennarrowingdown a searchon the Internet.EmailOnline methodof sendingletters anddocuments toothersHoaxA fake story,lie, or rumorthatcirculates onthe internetUploadAct of sendingdata ordocuments toanothercomputer orserverAcceptableUse PolicyContractstudents signspledging thatthey will be gooddigital citizens atschoolEmojisSmall picturesand smiliesused in textmessagesand emailPlagiarismUsingsomeone'swork andclaiming themas your own.HardwareThephysicalparts of acomputerBystanderA person whodoes nothingwhen theyknow about orsee bullyingMalwarePrograms thatare designedto damagecomputersand networksTextMessagesShort writtencommunications,usually throughcellphonesSpamIrrelevant orinappropriatemessages sentto a largenumber ofpeopleWebsiteAddressFirewallPart of acomputernetwork which isdesigned to blockunauthorizedaccessReliableWebsites thathave accurateinformationare known asthisFlamingTerm meaningwhen someoneuses meanwords to attackanother persononline.DigitalFootprintTrail of dataleft behindwhen peopleuse theinternetCopyrightLaw thatprotects therights ofauthors andcreators of theirworkSocialMediaWebsites suchas Facebook,Instagram,TikTok, orTwitter/XDownloadAct of gettingdata fromsomeone else'scomputer toyoursAnonymousNotidentifiedby nameIdentityTheftUsingsomeoneelse's privateidentifyinginformationUpstanderSomeonewho supportsothers and isagainstbullyingHackerPerson whogets in tocomputersystems todamage themPhishingSending emailsintended to getother people toreveal personalinformationTargetSomeonewho is avictim of acyberbullyHomepageThe firstor mainpage of awebsite.SoftwareThe programson a computerthat tell thehardwarewhat to doPasswordSecretcombination ofletters, numbers,and symbolsused to protectone's dataBrowserProgram thatallows us toview contenton theInternetCyberbullySomeonewho is mean,bothers orharassesothers online.NetiquetteStandards orrules thatdefine how weshould behavewhile onlineKeywordsSpecific termsused whennarrowingdown a searchon the Internet.EmailOnline methodof sendingletters anddocuments toothersHoaxA fake story,lie, or rumorthatcirculates onthe internetUploadAct of sendingdata ordocuments toanothercomputer orserverAcceptableUse PolicyContractstudents signspledging thatthey will be gooddigital citizens atschoolEmojisSmall picturesand smiliesused in textmessagesand email

Digital Citizenship Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
  1. Using someone's work and claiming them as your own.
    Plagiarism
  2. The physical parts of a computer
    Hardware
  3. A person who does nothing when they know about or see bullying
    Bystander
  4. Programs that are designed to damage computers and networks
    Malware
  5. Short written communications, usually through cellphones
    Text Messages
  6. Irrelevant or inappropriate messages sent to a large number of people
    Spam
  7. Website Address
  8. Part of a computer network which is designed to block unauthorized access
    Firewall
  9. Websites that have accurate information are known as this
    Reliable
  10. Term meaning when someone uses mean words to attack another person online.
    Flaming
  11. Trail of data left behind when people use the internet
    Digital Footprint
  12. Law that protects the rights of authors and creators of their work
    Copyright
  13. Websites such as Facebook, Instagram, TikTok, or Twitter/X
    Social Media
  14. Act of getting data from someone else's computer to yours
    Download
  15. Not identified by name
    Anonymous
  16. Using someone else's private identifying information
    Identity Theft
  17. Someone who supports others and is against bullying
    Upstander
  18. Person who gets in to computer systems to damage them
    Hacker
  19. Sending emails intended to get other people to reveal personal information
    Phishing
  20. Someone who is a victim of a cyberbully
    Target
  21. The first or main page of a website.
    Homepage
  22. The programs on a computer that tell the hardware what to do
    Software
  23. Secret combination of letters, numbers, and symbols used to protect one's data
    Password
  24. Program that allows us to view content on the Internet
    Browser
  25. Someone who is mean, bothers or harasses others online.
    Cyberbully
  26. Standards or rules that define how we should behave while online
    Netiquette
  27. Specific terms used when narrowing down a search on the Internet.
    Keywords
  28. Online method of sending letters and documents to others
    Email
  29. A fake story, lie, or rumor that circulates on the internet
    Hoax
  30. Act of sending data or documents to another computer or server
    Upload
  31. Contract students signs pledging that they will be good digital citizens at school
    Acceptable Use Policy
  32. Small pictures and smilies used in text messages and email
    Emojis