1. Arrange students into groups. Each group needs at least ONE person who has a mobile device.
2. If their phone camera doesn't automatically detect and decode QR codes, ask students to
4. Cut them out and place them around your class / school.
1. Give each group a clipboard and a piece of paper so they can write down the decoded questions and their answers to them.
2. Explain to the students that the codes are hidden around the school. Each team will get ONE point for each question they correctly decode and copy down onto their sheet, and a further TWO points if they can then provide the correct answer and write this down underneath the question.
3. Away they go! The winner is the first team to return with the most correct answers in the time available. This could be within a lesson, or during a lunchbreak, or even over several days!
4. A detailed case study in how to set up a successful QR Scavenger Hunt using this tool can be found here.
Question | Answer |
1. 1. What does URL stand for? | 8 | 2. 2. What would you be most likely to use to find web pages about a particular topic? | 8 | 3. 3. What does WWW stand for in the context of the Internet? | 8 | 4. 4. Unsolicited emails are commonly known as what? | 8 | 5. 5. What are the separate pages of a spreadsheet called? | 8 | 6. 6. What do you write to perform calculations in a spreadsheet? | 8 | 7. 7. What can be used to uniquely identify each cell in a spreadsheet? | 8 | 8. 8. What is the sequence of instructions, written to control an object or thing, known as? | 8 | 9. 9. What program is best to create a poster? | 8 | 10. 10. What is CPU short for? | 8 | 11. 11. What does GIGO stand for? | 8 | 12. 12. What does https stand for? | 8 | 13. 13. In which continent is Kenya? | 8 | 14. 14. Which part of Africa is Kenya located? | 8 | 15. 15. What is the name of Kenya's capital city? | 8 | 16. 16. Which is Kenya's highest mountain? | 8 | 17. 17. Which ocean is to the East of Kenya? | 8 | 18. 18. Harassment through the Internet that is rude and/or threatening is called: | 8 | 19. 19. Malicious software that monitors and tracks personal information is called: | 8 | 20. 20. A program that replicates itself and spreads through the machine is called: | 8 | 21. 21. An email that is unsolicited and is advertising something is called: | 8 | 22. 22. What is the name of Liverpool's stadium? | 8 | 23. 23. What is the name of Manchester City stadium? | 8 | 24. 24. What is the name of Manchester United stadium? | 8 | 25. 25. What is the name of Chelsea stadium? | 8 |
Question 1 (of 25)
Question 2 (of 25)
Question 3 (of 25)
Question 4 (of 25)
Question 5 (of 25)
Question 6 (of 25)
Question 7 (of 25)
Question 8 (of 25)
Question 9 (of 25)
Question 10 (of 25)
Question 11 (of 25)
Question 12 (of 25)
Question 13 (of 25)
Question 14 (of 25)
Question 15 (of 25)
Question 16 (of 25)
Question 17 (of 25)
Question 18 (of 25)
Question 19 (of 25)
Question 20 (of 25)
Question 21 (of 25)
Question 22 (of 25)
Question 23 (of 25)
Question 24 (of 25)
Question 25 (of 25)