Icon Créer jeu Créer jeu
Obtenir Plan Académique
Obtenir Plan Académique
Obtenir Plan Académique

Emoji Pictionary

Test

Identify terminology based on the Pictionary provided

Téléchargez la version pour jouer sur papier

107 fois fait

Créé par

India

Top 10 résultats

  1. 1
    03:00
    temps
    100
    but
  2. 2
    02:43
    temps
    70
    but
  3. 3
    Smita
    Smita
    08:20
    temps
    30
    but
  4. 4
    01:02
    temps
    10
    but
  5. 5
    Dina
    Dina
    00:08
    temps
    0
    but
  6. 6
    MANOJ
    MANOJ
    00:32
    temps
    0
    but
Voulez-vous apparaître dans le Top 10 de ce jeu? pour vous identifier.
Créez votre propre jeu gratuite à partir de notre créateur de jeu
Affrontez vos amis pour voir qui obtient le meilleur score dans ce jeu

Top Jeux

  1. temps
    but
  1. temps
    but
temps
but
temps
but
 
game-icon

Emoji PictionaryVersion en ligne

Identify terminology based on the Pictionary provided

par cybergamification esflabs
1

Written answer

2

Written answer

3

Written answer

4

Written answer

5

Written answer

6

Written answer

7

Written answer

8

Written answer

9

Written answer

10

Written answer

Feedback

Deep Web: is the part of the internet that is not indexed by search engines Dark Web: A small subset of the deep web that requires specific software, like Tor often associated with illegal activities but also serves as a space for anonymous communication

A security method that adds an extra layer of protection to your online accounts. Instead of just entering a password, you also need to provide a second form of verification

A security system that monitors and controls incoming and outgoing network traffic. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet.

IP address: allows devices to send and receive information over the internet by providing a specific address that identifies both the device and its location on the network.

Blackhat Hacker is who uses their technical skills to exploit computer systems and networks for malicious purposes, such as stealing data or causing damage.

Sandbox is a secure, isolated environment used to safely test and analyze potentially malicious code or programs without risking harm to the actual computer system or network.

Encryption is the process of converting information into a coded format that can only be accessed or read by authorized parties.

Ransomware is a type of malicious software that encrypts a victim's files, denying them access until a ransom is paid to the attacker.

Antivirus software is a security program designed to detect, prevent, and remove malware from computers and networks.

Phishing emails are deceptive messages that mimic legitimate sources to trick recipients into revealing sensitive information or clicking on malicious links.

educaplay suscripción