Also known as a digitaltrail, this refers to thedigital records andtraces that individuals,organizations, ordevices leave behindas a result of theironline activities.An agreementthe classmakes on howto treat eachother. We signit.Usingsomeoneelse's workas your ownwithout creditThe cables thatconnectcountries viathe internet thatrest on theocean floor.Havingmanners onlineand treatingothers how youwant to betreated.Details that can be used toidentify,describe, or contact anindividual.Examples may includename, birthdate,gender, social securitynumber, address,height, weight, financialaccount numbers,and health information.A form of intellectual property thatprotects the creators of originalworks ofauthorship. These exclusiverightsgenerally include the right toreproduce,distribute, perform, display, andcreatederivative works based on theoriginalwork.Platforms designedto enable individuals,groups, andorganizations toconnect,communicate andshare content.The body ofinformation about anindividual,organization, ordevice thatexists online. Comesfrom your digitalfootprint.Using goodsense andsoundjudgment inpracticalmatters.A malicious act wheresomeone uses email todeceive individuals intorevealingconfidential informationsuch as PIN orcredit card numbers.May contain links withmalware or viruses.The norms ofappropriate,responsiblebehavior withregard to the useoftechnology.The physicalwires or cablesand other thingsthat allow theinternet to existand run smoothly.DOBA globalcomputerpacket networkthat usesstandardizedprotocols.SSNPretending tobe someoneelse, typicallyfor deceptive orfraudulentpurposes.A deceptive technique used totrickindividuals into making decisionsthatcompromise security or privacy.Unlikehacking, which exploits technicalvulnerabilities, social engineeringexploitshuman psychology, trust andsocialinteractions to gainThe use of electroniccommunication tobully a persontypically by sendingmessages of anintimidating orthreatening nature.The right of anindividual to keepcertainaspects of theirpersonal life freefrombeing observed ordisturbed by othersAnyonewho usestheinternet.The most basictype of networkinfrastructure.Commonly foundin schools, offices,stores, andhomes.The practice ofmonitoring onlineactivitiesof individuals as theyinteract withwebsites,applications, anddigital services.an identifying numberallocated to anindividual by a bankor other organizationand used forvalidating electronictransactionsThe type ofcontent you takein, and the typeof environmentyou make forothers.A type of social engineeringin the form ofenticing behavior aimed atluringsomeone into a trap,confrontation, orharmful situation to revealpersonal orfinancial information orintroducemalware. Also known as a digitaltrail, this refers to thedigital records andtraces that individuals,organizations, ordevices leave behindas a result of theironline activities.An agreementthe classmakes on howto treat eachother. We signit.Usingsomeoneelse's workas your ownwithout creditThe cables thatconnectcountries viathe internet thatrest on theocean floor.Havingmanners onlineand treatingothers how youwant to betreated.Details that can be used toidentify,describe, or contact anindividual.Examples may includename, birthdate,gender, social securitynumber, address,height, weight, financialaccount numbers,and health information.A form of intellectual property thatprotects the creators of originalworks ofauthorship. These exclusiverightsgenerally include the right toreproduce,distribute, perform, display, andcreatederivative works based on theoriginalwork.Platforms designedto enable individuals,groups, andorganizations toconnect,communicate andshare content.The body ofinformation about anindividual,organization, ordevice thatexists online. Comesfrom your digitalfootprint.Using goodsense andsoundjudgment inpracticalmatters.A malicious act wheresomeone uses email todeceive individuals intorevealingconfidential informationsuch as PIN orcredit card numbers.May contain links withmalware or viruses.The norms ofappropriate,responsiblebehavior withregard to the useoftechnology.The physicalwires or cablesand other thingsthat allow theinternet to existand run smoothly.DOBA globalcomputerpacket networkthat usesstandardizedprotocols.SSNPretending tobe someoneelse, typicallyfor deceptive orfraudulentpurposes.A deceptive technique used totrickindividuals into making decisionsthatcompromise security or privacy.Unlikehacking, which exploits technicalvulnerabilities, social engineeringexploitshuman psychology, trust andsocialinteractions to gainThe use of electroniccommunication tobully a persontypically by sendingmessages of anintimidating orthreatening nature.The right of anindividual to keepcertainaspects of theirpersonal life freefrombeing observed ordisturbed by othersAnyonewho usestheinternet.The most basictype of networkinfrastructure.Commonly foundin schools, offices,stores, andhomes.The practice ofmonitoring onlineactivitiesof individuals as theyinteract withwebsites,applications, anddigital services.an identifying numberallocated to anindividual by a bankor other organizationand used forvalidating electronictransactionsThe type ofcontent you takein, and the typeof environmentyou make forothers.A type of social engineeringin the form ofenticing behavior aimed atluringsomeone into a trap,confrontation, orharmful situation to revealpersonal orfinancial information orintroducemalware. 

Ms. Brogan's Digital Citizenship Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Also known as a digital trail, this refers to the digital records and traces that individuals, organizations, or devices leave behind as a result of their online activities.
  2. An agreement the class makes on how to treat each other. We sign it.
  3. Using someone else's work as your own without credit
  4. The cables that connect countries via the internet that rest on the ocean floor.
  5. Having manners online and treating others how you want to be treated.
  6. Details that can be used to identify, describe, or contact an individual. Examples may include name, birthdate, gender, social security number, address, height, weight, financial account numbers, and health information.
  7. A form of intellectual property that protects the creators of original works of authorship. These exclusive rights generally include the right to reproduce, distribute, perform, display, and create derivative works based on the original work.
  8. Platforms designed to enable individuals, groups, and organizations to connect, communicate and share content.
  9. The body of information about an individual, organization, or device that exists online. Comes from your digital footprint.
  10. Using good sense and sound judgment in practical matters.
  11. A malicious act where someone uses email to deceive individuals into revealing confidential information such as PIN or credit card numbers. May contain links with malware or viruses.
  12. The norms of appropriate, responsible behavior with regard to the use of technology.
  13. The physical wires or cables and other things that allow the internet to exist and run smoothly.
  14. DOB
  15. A global computer packet network that uses standardized protocols.
  16. SSN
  17. Pretending to be someone else, typically for deceptive or fraudulent purposes.
  18. A deceptive technique used to trick individuals into making decisions that compromise security or privacy. Unlike hacking, which exploits technical vulnerabilities, social engineering exploits human psychology, trust and social interactions to gain
  19. The use of electronic communication to bully a person typically by sending messages of an intimidating or threatening nature.
  20. The right of an individual to keep certain aspects of their personal life free from being observed or disturbed by others
  21. Anyone who uses the internet.
  22. The most basic type of network infrastructure. Commonly found in schools, offices, stores, and homes.
  23. The practice of monitoring online activities of individuals as they interact with websites, applications, and digital services.
  24. an identifying number allocated to an individual by a bank or other organization and used for validating electronic transactions
  25. The type of content you take in, and the type of environment you make for others.
  26. A type of social engineering in the form of enticing behavior aimed at luring someone into a trap, confrontation, or harmful situation to reveal personal or financial information or introduce malware.