(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
Using someone's work and claiming them as your own.
Plagiarism
Specific terms used when narrowing down a search on the Internet.
Keywords
Secret combination of letters, numbers, and symbols used to protect one's data
Password
Using someone else's private identifying information
Identity Theft
Website Address
Not identified by name
Anonymous
Websites such as Facebook, Instagram, TikTok, or Twitter/X
Social Media
Program that allows us to view content on the Internet
Browser
Someone who supports others and is against bullying
Upstander
Act of getting data from someone else's computer to yours
Download
Standards or rules that define how we should behave while online
Netiquette
The first or main page of a website.
Homepage
Websites that have accurate information are known as this
Reliable
Contract students signs pledging that they will be good digital citizens at school
Acceptable Use Policy
Person who gets in to computer systems to damage them
Hacker
The physical parts of a computer
Hardware
Small pictures and smilies used in text messages and email
Emojis
Someone who is mean, bothers or harasses others online.
Cyberbully
Programs that are designed to damage computers and networks
Malware
A fake story, lie, or rumor that circulates on the internet
Hoax
Someone who is a victim of a cyberbully
Target
Online method of sending letters and documents to others
Email
Law that protects the rights of authors and creators of their work
Copyright
Trail of data left behind when people use the internet
Digital Footprint
Irrelevant or inappropriate messages sent to a large number of people
Spam
Short written communications, usually through cellphones
Text Messages
Sending emails intended to get other people to reveal personal information
Phishing
A person who does nothing when they know about or see bullying
Bystander
The programs on a computer that tell the hardware what to do
Software
Act of sending data or documents to another computer or server
Upload
Part of a computer network which is designed to block unauthorized access
Firewall
Term meaning when someone uses mean words to attack another person online.
Flaming