Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.
Instructions
Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
Now start joining each question on the right hand side of the card to the matching answer on the next card.
Carry on until all the cards loop together and you have competed the game!
Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.
A legal framework that grants exclusive rights to creators and authors for their original works, preventing others from reproducing or distributing them without permission.
Ransomware
A type of malicious software that encrypts a victim's data and demands a ransom payment in exchange for decrypting and restoring access.
Access Divide
The unequal distribution of access to digital technologies and resources.
Technology Gap
The disparity in technology access and use between different groups or regions.
GNU General Public License (GPL)
A widely used free software license that guarantees end users the freedom to run, study, share, and modify the software.
Online Courses
Educational courses and programs that are delivered over the internet, allowing individuals to learn at their own pace.
Data Breach
Unauthorized individuals gain access to and exploit sensitive or confidential data when they gain entry to information intended to be kept private or classified.
Integrity
In the realm of IT, honesty, trustworthiness, and the commitment to ethical principles are the qualities displayed by IT professionals.
Data Breaches
Incidents where unauthorized individuals gain access to data, often resulting in potential harm or privacy violations.
Phishing
A deceitful online method that dupes individuals into divulging their personal or sensitive information is known as a fraudulent activity.