Printable Loopcards | Topic 3—Networks (9 hours) | IB Computer Science

What are loop cards?

Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.

Instructions

  1. Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
  2. Now start joining each question on the right hand side of the card to the matching answer on the next card.
  3. Carry on until all the cards loop together and you have competed the game!

Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.

Edit Vocab

Loss of data, financial losses, damage to reputation, disruption of business operations, legal liabilities, and loss of customer trust.
What are the disadvantages of using firewalls?
Firewalls can be expensive to implement and maintain, and can sometimes interfere with legitimate network traffic.
What are some common lossy compression algorithms?
JPEG, MPEG, MP3.
What is the function of a router in a wireless network?
A router is responsible for distributing network traffic between devices and connecting the network to the internet.
What is digital transmission?
It is a method of transmitting data that uses discrete electrical signals to represent the information.
What is the bandwidth of a communication channel?
It is the range of frequencies that can be transmitted over the channel.
What are the advantages of a PAN?
PANs are typically very easy to set up and use, and allow for communication between devices in close proximity.
What are some disadvantages of lossless compression?
May not be able to achieve as high compression ratios as lossy compression.
What is the purpose of network security?
To protect computer networks from unauthorized access or attack.
What is the purpose of communication layers in computer networks?
To enable communication between different devices in a structured and organized manner.
What are the consequences of network security breaches?