A malicious act wheresomeone uses email todeceive individuals intorevealingconfidential informationsuch as PIN orcredit card numbers.May contain links withmalware or viruses.Usingsomeoneelse's workas your ownwithout creditThe type ofcontent you takein, and the typeof environmentyou make forothers.A type of social engineeringin the form ofenticing behavior aimed atluringsomeone into a trap,confrontation, orharmful situation to revealpersonal orfinancial information orintroducemalware. Pretending tobe someoneelse, typicallyfor deceptive orfraudulentpurposes.A form of intellectual property thatprotects the creators of originalworks ofauthorship. These exclusiverightsgenerally include the right toreproduce,distribute, perform, display, andcreatederivative works based on theoriginalwork.The practice ofmonitoring onlineactivitiesof individuals as theyinteract withwebsites,applications, anddigital services.The use of electroniccommunication tobully a persontypically by sendingmessages of anintimidating orthreatening nature.an identifying numberallocated to anindividual by a bankor other organizationand used forvalidating electronictransactionsUsing goodsense andsoundjudgment inpracticalmatters.The most basictype of networkinfrastructure.Commonly foundin schools, offices,stores, andhomes.A globalcomputerpacket networkthat usesstandardizedprotocols.The right of anindividual to keepcertainaspects of theirpersonal life freefrombeing observed ordisturbed by othersPlatforms designedto enable individuals,groups, andorganizations toconnect,communicate andshare content.Havingmanners onlineand treatingothers how youwant to betreated.The norms ofappropriate,responsiblebehavior withregard to the useoftechnology.Anyonewho usestheinternet.The physicalwires or cablesand other thingsthat allow theinternet to existand run smoothly.Also known as a digitaltrail, this refers to thedigital records andtraces that individuals,organizations, ordevices leave behindas a result of theironline activities.The cables thatconnectcountries viathe internet thatrest on theocean floor.An agreementthe classmakes on howto treat eachother. We signit.A deceptive technique used totrickindividuals into making decisionsthatcompromise security or privacy.Unlikehacking, which exploits technicalvulnerabilities, social engineeringexploitshuman psychology, trust andsocialinteractions to gainDOBSSNDetails that can be used toidentify,describe, or contact anindividual.Examples may includename, birthdate,gender, social securitynumber, address,height, weight, financialaccount numbers,and health information.The body ofinformation about anindividual,organization, ordevice thatexists online. Comesfrom your digitalfootprint.A malicious act wheresomeone uses email todeceive individuals intorevealingconfidential informationsuch as PIN orcredit card numbers.May contain links withmalware or viruses.Usingsomeoneelse's workas your ownwithout creditThe type ofcontent you takein, and the typeof environmentyou make forothers.A type of social engineeringin the form ofenticing behavior aimed atluringsomeone into a trap,confrontation, orharmful situation to revealpersonal orfinancial information orintroducemalware. Pretending tobe someoneelse, typicallyfor deceptive orfraudulentpurposes.A form of intellectual property thatprotects the creators of originalworks ofauthorship. These exclusiverightsgenerally include the right toreproduce,distribute, perform, display, andcreatederivative works based on theoriginalwork.The practice ofmonitoring onlineactivitiesof individuals as theyinteract withwebsites,applications, anddigital services.The use of electroniccommunication tobully a persontypically by sendingmessages of anintimidating orthreatening nature.an identifying numberallocated to anindividual by a bankor other organizationand used forvalidating electronictransactionsUsing goodsense andsoundjudgment inpracticalmatters.The most basictype of networkinfrastructure.Commonly foundin schools, offices,stores, andhomes.A globalcomputerpacket networkthat usesstandardizedprotocols.The right of anindividual to keepcertainaspects of theirpersonal life freefrombeing observed ordisturbed by othersPlatforms designedto enable individuals,groups, andorganizations toconnect,communicate andshare content.Havingmanners onlineand treatingothers how youwant to betreated.The norms ofappropriate,responsiblebehavior withregard to the useoftechnology.Anyonewho usestheinternet.The physicalwires or cablesand other thingsthat allow theinternet to existand run smoothly.Also known as a digitaltrail, this refers to thedigital records andtraces that individuals,organizations, ordevices leave behindas a result of theironline activities.The cables thatconnectcountries viathe internet thatrest on theocean floor.An agreementthe classmakes on howto treat eachother. We signit.A deceptive technique used totrickindividuals into making decisionsthatcompromise security or privacy.Unlikehacking, which exploits technicalvulnerabilities, social engineeringexploitshuman psychology, trust andsocialinteractions to gainDOBSSNDetails that can be used toidentify,describe, or contact anindividual.Examples may includename, birthdate,gender, social securitynumber, address,height, weight, financialaccount numbers,and health information.The body ofinformation about anindividual,organization, ordevice thatexists online. Comesfrom your digitalfootprint.

Ms. Brogan's Digital Citizenship Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. A malicious act where someone uses email to deceive individuals into revealing confidential information such as PIN or credit card numbers. May contain links with malware or viruses.
  2. Using someone else's work as your own without credit
  3. The type of content you take in, and the type of environment you make for others.
  4. A type of social engineering in the form of enticing behavior aimed at luring someone into a trap, confrontation, or harmful situation to reveal personal or financial information or introduce malware.
  5. Pretending to be someone else, typically for deceptive or fraudulent purposes.
  6. A form of intellectual property that protects the creators of original works of authorship. These exclusive rights generally include the right to reproduce, distribute, perform, display, and create derivative works based on the original work.
  7. The practice of monitoring online activities of individuals as they interact with websites, applications, and digital services.
  8. The use of electronic communication to bully a person typically by sending messages of an intimidating or threatening nature.
  9. an identifying number allocated to an individual by a bank or other organization and used for validating electronic transactions
  10. Using good sense and sound judgment in practical matters.
  11. The most basic type of network infrastructure. Commonly found in schools, offices, stores, and homes.
  12. A global computer packet network that uses standardized protocols.
  13. The right of an individual to keep certain aspects of their personal life free from being observed or disturbed by others
  14. Platforms designed to enable individuals, groups, and organizations to connect, communicate and share content.
  15. Having manners online and treating others how you want to be treated.
  16. The norms of appropriate, responsible behavior with regard to the use of technology.
  17. Anyone who uses the internet.
  18. The physical wires or cables and other things that allow the internet to exist and run smoothly.
  19. Also known as a digital trail, this refers to the digital records and traces that individuals, organizations, or devices leave behind as a result of their online activities.
  20. The cables that connect countries via the internet that rest on the ocean floor.
  21. An agreement the class makes on how to treat each other. We sign it.
  22. A deceptive technique used to trick individuals into making decisions that compromise security or privacy. Unlike hacking, which exploits technical vulnerabilities, social engineering exploits human psychology, trust and social interactions to gain
  23. DOB
  24. SSN
  25. Details that can be used to identify, describe, or contact an individual. Examples may include name, birthdate, gender, social security number, address, height, weight, financial account numbers, and health information.
  26. The body of information about an individual, organization, or device that exists online. Comes from your digital footprint.