What are loop cards?

Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.

Instructions

  1. Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
  2. Now start joining each question on the right hand side of the card to the matching answer on the next card.
  3. Carry on until all the cards loop together and you have competed the game!

Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.

Edit Vocab

The presence of individuals from different backgrounds and identities, including but not limited to gender, race, ethnicity, and socioeconomic status, in computing fields.
Breach Notification
The requirement to inform individuals and authorities of a security breach that involves their personal data.
Legal Considerations
The factors and laws that must be taken into account when making legal decisions, such as compliance with regulations, contracts, and ethical standards.
Social Media
Online platforms and websites that enable users to create and share content, interact with others, and participate in online communities.
Gender Gap
The disparity in opportunities, representation, and pay between men and women in the tech industry.
Data Subject
An individual who can be identified by their personal data and has certain rights over its processing and protection.
Self-Study
The process of independent learning and acquiring knowledge through books, online resources, and other learning materials.
Corporate Governance
The system of rules, practices, and processes by which a company is directed and controlled, including the relationships among stakeholders and the goals for which the corporation is governed.
Invention
A novel and useful creation, usually in the form of a product or process, resulting from human creativity and ingenuity.
Phishing
A deceitful online method that dupes individuals into divulging their personal or sensitive information is known as a fraudulent activity.
Diversity