Icon New game New game
Get Academic Plan
Get Academic Plan
Get Academic Plan

Emoji Pictionary

Quiz

Identify terminology based on the Pictionary provided

Download the paper version to play

107 times made

Created by

India

Top 10 results

  1. 1
    03:00
    time
    100
    score
  2. 2
    02:43
    time
    70
    score
  3. 3
    Smita
    Smita
    08:20
    time
    30
    score
  4. 4
    01:02
    time
    10
    score
  5. 5
    Dina
    Dina
    00:08
    time
    0
    score
  6. 6
    MANOJ
    MANOJ
    00:32
    time
    0
    score
Do you want to stay in the Top 10 of this game? to identify yourself.
Make your own free game from our game creator
Compete against your friends to see who gets the best score in this game

Top Games

  1. time
    score
  1. time
    score
time
score
time
score
 
game-icon

Emoji PictionaryOnline version

Identify terminology based on the Pictionary provided

by cybergamification esflabs
1

Written answer

2

Written answer

3

Written answer

4

Written answer

5

Written answer

6

Written answer

7

Written answer

8

Written answer

9

Written answer

10

Written answer

Feedback

Deep Web: is the part of the internet that is not indexed by search engines Dark Web: A small subset of the deep web that requires specific software, like Tor often associated with illegal activities but also serves as a space for anonymous communication

A security method that adds an extra layer of protection to your online accounts. Instead of just entering a password, you also need to provide a second form of verification

A security system that monitors and controls incoming and outgoing network traffic. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet.

IP address: allows devices to send and receive information over the internet by providing a specific address that identifies both the device and its location on the network.

Blackhat Hacker is who uses their technical skills to exploit computer systems and networks for malicious purposes, such as stealing data or causing damage.

Sandbox is a secure, isolated environment used to safely test and analyze potentially malicious code or programs without risking harm to the actual computer system or network.

Encryption is the process of converting information into a coded format that can only be accessed or read by authorized parties.

Ransomware is a type of malicious software that encrypts a victim's files, denying them access until a ransom is paid to the attacker.

Antivirus software is a security program designed to detect, prevent, and remove malware from computers and networks.

Phishing emails are deceptive messages that mimic legitimate sources to trick recipients into revealing sensitive information or clicking on malicious links.

educaplay suscripción