What are loop cards?

Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.

Instructions

  1. Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
  2. Now start joining each question on the right hand side of the card to the matching answer on the next card.
  3. Carry on until all the cards loop together and you have competed the game!

Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.

Edit Vocab

A network security device is an apparatus that monitors and filters incoming and outgoing network traffic based on predetermined security rules.
Mobile Payments
The use of personal area networks to enable secure and convenient mobile payments using smartphones, wearables, or other personal devices.
Frequency Band
The range of radio frequencies used for wireless communication, such as 2.4 GHz and 5 GHz.
Internet Of Things
A network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and network connectivity, which enables these objects to connect and exchange data.
Personalized Entertainment
The use of personal area networks to deliver personalized entertainment content, such as streaming music, movies, and TV shows to personal devices.
Scalability
The ability of a network to easily accommodate an increasing number of users, devices, or data traffic without a significant decrease in performance.
Latency
The time it takes for a data packet to travel from its source to its destination, often measured in milliseconds.
Traffic Shaping
The process of managing or controlling the flow of network traffic to improve performance, prioritize certain types of traffic, or prevent congestion.
LAN
An interconnected system that links computers and devices together within a confined environment, such as a home or office.
Location Tracking
The use of personal area networks to track and monitor the location of individuals or objects, often used for navigation, asset tracking, or geofencing.
Firewall