1. Arrange students into groups. Each group needs at least ONE person who has a mobile device.
2. If their phone camera doesn't automatically detect and decode QR codes, ask students to
4. Cut them out and place them around your class / school.
1. Give each group a clipboard and a piece of paper so they can write down the decoded questions and their answers to them.
2. Explain to the students that the codes are hidden around the school. Each team will get ONE point for each question they correctly decode and copy down onto their sheet, and a further TWO points if they can then provide the correct answer and write this down underneath the question.
3. Away they go! The winner is the first team to return with the most correct answers in the time available. This could be within a lesson, or during a lunchbreak, or even over several days!
4. A detailed case study in how to set up a successful QR Scavenger Hunt using this tool can be found here.
Question | Answer |
1. What hardware device allows you to input numbers, letters, and symbols into the computer? | keyboard | 2. What does CPU stand for? | Central Processing Unit | 3. What is your technology teacher’s name? | Mrs. Hamilton | 4. Mozilla Firefox, Google Chrome, and Safari are all examples of what? | web browsers | 5. What do we call the shape and style of text? | font | 6. What does “www” stand for? | World Wide Web | 7. Name the input device used to choose, select, and move things around on the screen. | mouse | 8. What do we call the code for security protection that allows someone to access a computer or computer programs? | password | 9. What are the cartoon-like images that we insert into documents to make them look more pleasing to the eye called? | clipart | 10. What are connections that attach or bridge one image, page, or word to another by clicking on a highlighted word or phrase called? | links | 11. Name the output device that is used to make paper copies of what is created on the computer. | printer | 12. What are words on a page called? | text | 13. What do we call electronic mail that is sent and received through a computer network? | 14. What do we call a computer program that is designed to damage or do harm to computer files? | virus | 15. Google, Ask.com, Yahoo, and Bing are all examples of what? | search engines | 16. The Universal Resource Locator (URL) is also known as the what? | web address | 17. Symbols or illustrations appearing on the computer screen that represent programs or files are also known as what? | icons | 18. What do we call a small, lightweight, portable battery-powered computer that can fit onto your lap? | laptop | 19. To reduce a window to an icon, or a label that is then placed at the top or bottom of the screen is to what? | minimize | 20. What is a system of interconnected computers called? | network |
Question 1 (of 20)
Question 2 (of 20)
Question 3 (of 20)
Question 4 (of 20)
Question 5 (of 20)
Question 6 (of 20)
Question 7 (of 20)
Question 8 (of 20)
Question 9 (of 20)
Question 10 (of 20)
Question 11 (of 20)
Question 12 (of 20)
Question 13 (of 20)
Question 14 (of 20)
Question 15 (of 20)
Question 16 (of 20)
Question 17 (of 20)
Question 18 (of 20)
Question 19 (of 20)
Question 20 (of 20)