Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.
Instructions
Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
Now start joining each question on the right hand side of the card to the matching answer on the next card.
Carry on until all the cards loop together and you have competed the game!
Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.
Prejudice or unfairness in decision-making processes or system designs that disproportionately affect certain individuals or groups based on factors such as gender, race, ethnicity, or socioeconomic status.
Allyship
The practice of individuals from dominant or privileged groups actively supporting and advocating for those from marginalized or underrepresented groups in computing.
Alt Text
Alternative text that is added to images, providing a textual description of the image content for individuals who cannot see the images in accessible document formats.
Work-Life Balance
Achieving a balance between professional work and personal life, which is important for women's inclusion in the tech industry.
Connectivity Gap
The disparity in access to reliable, high-speed internet connectivity.
Accessible Document Format
A file format designed to be easily accessible and readable by individuals with disabilities, such as visual impairments.
Growth Mindset
The belief that abilities and intelligence can be developed through dedication, hard work, and a willingness to learn, fostering inclusivity in computing education and careers.
Underrepresented
Referring to individuals or groups who are not adequately represented or present in computing fields, typically based on factors such as gender, race, ethnicity, or socioeconomic status.
Digital Divide
The gap between individuals and communities that have access to modern information and communication technology and those that do not.
Cybersecurity
The practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from digital attacks, theft, or damage.