Edit Game
Term2 - Network and the Internet
 Delete

Use commas to add multiple tags

 Private  Unlisted  Public



 Save

Delimiter between question and answer:

Tips:

  • No column headers.
  • Each line maps to a question.
  • If the delimiter is used in a question, the question should be surrounded by double quotes: "My, question","My, answer"
  • The first answer in the multiple choice question must be the correct answer.






 Save   13  Close
Name the different layers in Neural network ____________________
Input, Hidden and Output
How many layers does a Neural Network have _____________
3
A unit in a neural network that processes information (inspired by the human brain) _N___
Neuron
The data used to teach an AI system to recognise patterns _Tr_________________
Training Data
Face ID and Touch ID are examples of ____Bio____________ security
Biometric
What is the main purpose of network security?(_Th____ , _At______)
threats and attacks
Private information that must be kept secure ____Sen____________
Sentitive Data
Practice of protecting systems, networks, and programs from digital attacks __Cy________
Cybersecurity
An Email security software can protect the users from email attacks like (_Ph____)
Phishing
______________is network created to secure the connection between remote computer and other computes( 3 Letter Word (V))
VPN(Virtual Private Network)
Malware is also called as _______________(Ma____________)
Malicious
Two Common type of application security are authentication and ___(Auth)____________
Authorization
______________ is a software that is designed to block unauthorized access to computers and networks (_____wall)
Firewall