1. Arrange students into groups. Each group needs at least ONE person who has a mobile device.
2. If their phone camera doesn't automatically detect and decode QR codes, ask students to
4. Cut them out and place them around your class / school.
1. Give each group a clipboard and a piece of paper so they can write down the decoded questions and their answers to them.
2. Explain to the students that the codes are hidden around the school. Each team will get ONE point for each question they correctly decode and copy down onto their sheet, and a further TWO points if they can then provide the correct answer and write this down underneath the question.
3. Away they go! The winner is the first team to return with the most correct answers in the time available. This could be within a lesson, or during a lunchbreak, or even over several days!
4. A detailed case study in how to set up a successful QR Scavenger Hunt using this tool can be found here.
Question | Answer |
1. The four segments of the information processing cycle: | Input, processing, output, storage | 2. An individual computer workstation in a computer network: | Client | 3. The often large and powerful computer in a network that contains the network operating system software: | Server | 4. The protocol (4 letters) for sending and receiving web pages: | http | 5. The protocol (5 letters) for encrypting data before it is sent over the web: | https | 6. Computer programs that have a malicious intent: | malware | 7. A damaging computer program that reproduces itself and attacks all the computers on a network: | Worm | 8. A malware that masquerades itself as a useful program to fool the user into letting the hacker into the computer system: | Trojan | 9. A program that tracks a user's activity on the internet: | Spyware | 10. Small files that websites put on your computer to remember who you are on your next visit: | Cookies | 11. A method of convincing people to reveal their passwords, credit card numbers, social security numbers, or other private information by sending official-looking e-mails: | Phishing | 12. Software applications that are provided completely free of charge with no license or copyright restrictions | open-source | 13. Giga means: | billion | 14. Mega means: | million | 15. The temporary memory of a computer that provides workspace for the programs that the computer is currently processing which disappears after the power is shut off: | RAM (Random Access Memory) | 16. The start-up instructions to a computer when it is first turned on: | ROM (Read-Only Memory) | 17. The rate at which a CPU can process data is known as: | Clock speed | 18. The type of printer that is generally less expensive to purchase but is more expensive to operate in the long run for large quantities of printing: | Inkjet | 19. Software applications that are bundled into packages: | Suites | 20. The most common connection port on computers today in which up to 127 devices can be connected: | USB | 21. Laws that protect the developers of software that prohibit the illegal copying and distribution of the software: | Copyright laws | 22. Illegally copying software: | Piracy |
Question 1 (of 22)
Question 2 (of 22)
Question 3 (of 22)
Question 4 (of 22)
Question 5 (of 22)
Question 6 (of 22)
Question 7 (of 22)
Question 8 (of 22)
Question 9 (of 22)
Question 10 (of 22)
Question 11 (of 22)
Question 12 (of 22)
Question 13 (of 22)
Question 14 (of 22)
Question 15 (of 22)
Question 16 (of 22)
Question 17 (of 22)
Question 18 (of 22)
Question 19 (of 22)
Question 20 (of 22)
Question 21 (of 22)
Question 22 (of 22)