What are loop cards?

Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.

Instructions

  1. Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
  2. Now start joining each question on the right hand side of the card to the matching answer on the next card.
  3. Carry on until all the cards loop together and you have competed the game!

Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.

Edit Vocab

The process of dividing a computer network into smaller subnetworks for improved security and performance.
Firewall
A network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules.
Access Control
The practice of restricting and managing user access to network resources based on predetermined security policies.
Antivirus
Software designed to detect and remove computer viruses, preventing them from spreading and causing harm to a computer network.
User Agreement
A legally binding contract between a user and a service provider that establishes the terms and conditions for using the service.
Penetration Testing
A controlled attempt to exploit vulnerabilities in a network to assess its level of security.
Vulnerability Scanning
The process of identifying and assessing security vulnerabilities in a network infrastructure to address and mitigate potential risks.
Intrusion Detection System
A system that monitors network traffic to identify and respond to unauthorized access attempts or malicious activities.
Encryption
The process of converting plaintext data into an unreadable form to protect it from unauthorized access or theft.
Acceptable Use Policy
A set of rules and guidelines that outline the proper and acceptable use of a system, network, or service.
Network Segmentation