1. Arrange students into groups. Each group needs at least ONE person who has a mobile device.
2. If their phone camera doesn't automatically detect and decode QR codes, ask students to
4. Cut them out and place them around your class / school.
1. Give each group a clipboard and a piece of paper so they can write down the decoded questions and their answers to them.
2. Explain to the students that the codes are hidden around the school. Each team will get ONE point for each question they correctly decode and copy down onto their sheet, and a further TWO points if they can then provide the correct answer and write this down underneath the question.
3. Away they go! The winner is the first team to return with the most correct answers in the time available. This could be within a lesson, or during a lunchbreak, or even over several days!
4. A detailed case study in how to set up a successful QR Scavenger Hunt using this tool can be found here.
Question | Answer |
1. Bandwidth | The amount of data that can fit through an Internet connection | 2. Blog | A shared online journal where people can post diary entries | 3. Blue-jacking | The sending of unwanted messages to others over Bluetooth connections | 4. Bluetooth | Allows the exchange of data over short distances between devices | 5. Card code verification(CCV) | A set of numbers on the back of a credit card that help verify that the use of the card is legitimate | 6. Cloud computing | A system in which all computer programs and data is stored online | 7. Data protection act | This law regulates how personal information is used and protects against misuse of personal details. | 8. Digital divide | The gap between those that have access to digital technology and those that do not | 9. Firewall | A system designed to prevent unauthorised access to your computer from the Internet | 10. Geotag | To attach the exact geographical coordinates to a digital image, giving the location of where it was taken | 11. GPS | A navigational system used in many devices which gives a current location | 12. Hacker | Someone who gains unauthorised access to a computer in order to obtain data stored on it | 13. SaaS (Software as a Service) | Accessed via a web browser rather than being installed on the user's computer | 14. Internet Service Provider | A company that provides Internet access to its customers | 15. Latency | The time delay between a bit leaving one device and arriving at the other | 16. Peripherals | External devices connected to a computer | 17. Phishing | Emails designed to trick you into giving away personal details | 18. Spyware | Software that can be installed on your computer without your knowledge, which collects information about your logins and passwords | 19. Third party payment processor | A business that offers customers an alternative fast, safe method to pay for online goods and services, eg Paypal | 20. User-generated reference sites | Allow users to generate content collaboratively on a website to which others can refer to inform their research | 21. VoIP | Technology used to make telephone calls via the Internet, usually at a cheaper cost |
Question 1 (of 21)
Question 2 (of 21)
Question 3 (of 21)
Question 4 (of 21)
Question 5 (of 21)
Question 6 (of 21)
Question 7 (of 21)
Question 8 (of 21)
Question 9 (of 21)
Question 10 (of 21)
Question 11 (of 21)
Question 12 (of 21)
Question 13 (of 21)
Question 14 (of 21)
Question 15 (of 21)
Question 16 (of 21)
Question 17 (of 21)
Question 18 (of 21)
Question 19 (of 21)
Question 20 (of 21)
Question 21 (of 21)