Usingsomeoneelse's workas your ownwithout creditAn agreementthe classmakes on howto treat eachother. We signit.A form of intellectual property thatprotects the creators of originalworks ofauthorship. These exclusiverightsgenerally include the right toreproduce,distribute, perform, display, andcreatederivative works based on theoriginalwork.A malicious act wheresomeone uses email todeceive individuals intorevealingconfidential informationsuch as PIN orcredit card numbers.May contain links withmalware or viruses.Details that can be used toidentify,describe, or contact anindividual.Examples may includename, birthdate,gender, social securitynumber, address,height, weight, financialaccount numbers,and health information.The norms ofappropriate,responsiblebehavior withregard to the useoftechnology.Also known as a digitaltrail, this refers to thedigital records andtraces that individuals,organizations, ordevices leave behindas a result of theironline activities.Anyonewho usestheinternet.The most basictype of networkinfrastructure.Commonly foundin schools, offices,stores, andhomes.The body ofinformation about anindividual,organization, ordevice thatexists online. Comesfrom your digitalfootprint.The type ofcontent you takein, and the typeof environmentyou make forothers.A deceptive technique used totrickindividuals into making decisionsthatcompromise security or privacy.Unlikehacking, which exploits technicalvulnerabilities, social engineeringexploitshuman psychology, trust andsocialinteractions to gainHavingmanners onlineand treatingothers how youwant to betreated.DOBA type of social engineeringin the form ofenticing behavior aimed atluringsomeone into a trap,confrontation, orharmful situation to revealpersonal orfinancial information orintroducemalware. The cables thatconnectcountries viathe internet thatrest on theocean floor.Platforms designedto enable individuals,groups, andorganizations toconnect,communicate andshare content.The practice ofmonitoring onlineactivitiesof individuals as theyinteract withwebsites,applications, anddigital services.an identifying numberallocated to anindividual by a bankor other organizationand used forvalidating electronictransactionsThe use of electroniccommunication tobully a persontypically by sendingmessages of anintimidating orthreatening nature.Pretending tobe someoneelse, typicallyfor deceptive orfraudulentpurposes.The physicalwires or cablesand other thingsthat allow theinternet to existand run smoothly.Using goodsense andsoundjudgment inpracticalmatters.The right of anindividual to keepcertainaspects of theirpersonal life freefrombeing observed ordisturbed by othersSSNA globalcomputerpacket networkthat usesstandardizedprotocols.Usingsomeoneelse's workas your ownwithout creditAn agreementthe classmakes on howto treat eachother. We signit.A form of intellectual property thatprotects the creators of originalworks ofauthorship. These exclusiverightsgenerally include the right toreproduce,distribute, perform, display, andcreatederivative works based on theoriginalwork.A malicious act wheresomeone uses email todeceive individuals intorevealingconfidential informationsuch as PIN orcredit card numbers.May contain links withmalware or viruses.Details that can be used toidentify,describe, or contact anindividual.Examples may includename, birthdate,gender, social securitynumber, address,height, weight, financialaccount numbers,and health information.The norms ofappropriate,responsiblebehavior withregard to the useoftechnology.Also known as a digitaltrail, this refers to thedigital records andtraces that individuals,organizations, ordevices leave behindas a result of theironline activities.Anyonewho usestheinternet.The most basictype of networkinfrastructure.Commonly foundin schools, offices,stores, andhomes.The body ofinformation about anindividual,organization, ordevice thatexists online. Comesfrom your digitalfootprint.The type ofcontent you takein, and the typeof environmentyou make forothers.A deceptive technique used totrickindividuals into making decisionsthatcompromise security or privacy.Unlikehacking, which exploits technicalvulnerabilities, social engineeringexploitshuman psychology, trust andsocialinteractions to gainHavingmanners onlineand treatingothers how youwant to betreated.DOBA type of social engineeringin the form ofenticing behavior aimed atluringsomeone into a trap,confrontation, orharmful situation to revealpersonal orfinancial information orintroducemalware. The cables thatconnectcountries viathe internet thatrest on theocean floor.Platforms designedto enable individuals,groups, andorganizations toconnect,communicate andshare content.The practice ofmonitoring onlineactivitiesof individuals as theyinteract withwebsites,applications, anddigital services.an identifying numberallocated to anindividual by a bankor other organizationand used forvalidating electronictransactionsThe use of electroniccommunication tobully a persontypically by sendingmessages of anintimidating orthreatening nature.Pretending tobe someoneelse, typicallyfor deceptive orfraudulentpurposes.The physicalwires or cablesand other thingsthat allow theinternet to existand run smoothly.Using goodsense andsoundjudgment inpracticalmatters.The right of anindividual to keepcertainaspects of theirpersonal life freefrombeing observed ordisturbed by othersSSNA globalcomputerpacket networkthat usesstandardizedprotocols.

Ms. Brogan's Digital Citizenship Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Using someone else's work as your own without credit
  2. An agreement the class makes on how to treat each other. We sign it.
  3. A form of intellectual property that protects the creators of original works of authorship. These exclusive rights generally include the right to reproduce, distribute, perform, display, and create derivative works based on the original work.
  4. A malicious act where someone uses email to deceive individuals into revealing confidential information such as PIN or credit card numbers. May contain links with malware or viruses.
  5. Details that can be used to identify, describe, or contact an individual. Examples may include name, birthdate, gender, social security number, address, height, weight, financial account numbers, and health information.
  6. The norms of appropriate, responsible behavior with regard to the use of technology.
  7. Also known as a digital trail, this refers to the digital records and traces that individuals, organizations, or devices leave behind as a result of their online activities.
  8. Anyone who uses the internet.
  9. The most basic type of network infrastructure. Commonly found in schools, offices, stores, and homes.
  10. The body of information about an individual, organization, or device that exists online. Comes from your digital footprint.
  11. The type of content you take in, and the type of environment you make for others.
  12. A deceptive technique used to trick individuals into making decisions that compromise security or privacy. Unlike hacking, which exploits technical vulnerabilities, social engineering exploits human psychology, trust and social interactions to gain
  13. Having manners online and treating others how you want to be treated.
  14. DOB
  15. A type of social engineering in the form of enticing behavior aimed at luring someone into a trap, confrontation, or harmful situation to reveal personal or financial information or introduce malware.
  16. The cables that connect countries via the internet that rest on the ocean floor.
  17. Platforms designed to enable individuals, groups, and organizations to connect, communicate and share content.
  18. The practice of monitoring online activities of individuals as they interact with websites, applications, and digital services.
  19. an identifying number allocated to an individual by a bank or other organization and used for validating electronic transactions
  20. The use of electronic communication to bully a person typically by sending messages of an intimidating or threatening nature.
  21. Pretending to be someone else, typically for deceptive or fraudulent purposes.
  22. The physical wires or cables and other things that allow the internet to exist and run smoothly.
  23. Using good sense and sound judgment in practical matters.
  24. The right of an individual to keep certain aspects of their personal life free from being observed or disturbed by others
  25. SSN
  26. A global computer packet network that uses standardized protocols.