(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
news or stories that are created on purpose to be false to deceive or misinform readers
Fake News
a place you can visit while using the internet that has info on a person, company or organization
Website
a way to send messages electronically over the internet
Email
illegal use of somebody's private info, such as name or ss# to get money or credit
Identity Theft
sharing too much online such as personal info or certain situations or conversations
Oversharing
being connected to the internet, a computer, or any type of computer network
Online
an unwanted program that can damage your computer can be mild or very destructive
Computer Virus
specific info, such as ss#, address, phone #, that can be used to identify a person
Private Information
official statement or stamp that a website is reputable and doing a good job
Seal of Approval
credit given to a source used in a paper or research project that includes info such as author and title
Citation
copying or using somebody's else's work and claiming it as your own by not giving credit to the original author
Plagiarism
a websites statement or legal document for how they handle private information
Privacy Policy
list of the sources used for a research paper or project
Bibliography
a news source, website, author, or specialist that is considered trustworthy and reputable
Reputable
to put info, such as your name, into a website to be able to use it
Register
info you send or give another person through text or email
Message
a unique or made up name that allows you to access websites or online accounts
Username
pages displayed by a search engine, in response to a question
Source
personal info that you should keep to yourself or only share with people you trust
Private
pages displayed by a search engine in response to a question
Result Pages
a person who witnesses or knows about a case of cyberbullying but does nothing to help the target
Bystander
a document that all students and guardians sign when receiving a school device
Acceptable Use Policy
to keep something safe
Protect
a phrase or icon you can click to go to another site or another website
Link
a secret word or expression required by many websites to allow you to visit them
Password
using the internet or cellphone, usually over and over again, to make another person feel unhappy, sad, or afraid
Cyberbullying
obligation or duty you have to yourself or others when online
Online Responsibility
info about you that is on the internet, including websites you visit, emals you send, and comments you make
Digital Footprint
person who supports the target when they know cyberbullying is happening
Upstander
an online message, usually disruptive that the receiver did not request
Spam
a security measure that protects passwords and prevents the wrong people from using online accounts
Password Protection
when no author, contributor, or name is associated with an article or story
Anonymous
looking for info or ideas on the internet
Search
general info like age and gender that cannot be used to identify a person
Personal Information
freedom from danger or harm while using the internet
Online Safety
the correct or acceptable way of communicating on the internet
Netiquette
words used ot search for info on the internet about a topic or ideas
Keywords
someone who is being cyberbullied
Target
A system that connects people all over the world using computers, tablets, phones, and other devices
Internet