1. Arrange students into groups. Each group needs at least ONE person who has a mobile device.
2. If their phone camera doesn't automatically detect and decode QR codes, ask students to
4. Cut them out and place them around your class / school.
1. Give each group a clipboard and a piece of paper so they can write down the decoded questions and their answers to them.
2. Explain to the students that the codes are hidden around the school. Each team will get ONE point for each question they correctly decode and copy down onto their sheet, and a further TWO points if they can then provide the correct answer and write this down underneath the question.
3. Away they go! The winner is the first team to return with the most correct answers in the time available. This could be within a lesson, or during a lunchbreak, or even over several days!
4. A detailed case study in how to set up a successful QR Scavenger Hunt using this tool can be found here.
Question | Answer |
1. The Key Piece of Legislation concerning Health and Safety in the Workplace | AB | 2. They are a public body who are responsible for Workplace health, safety and welfare wwwhsegovuk for more information | AC | 3. Lifting and Carrying things at work | AD | 4. The British Safety council stated that in 2008 British Businesses lost £250 per second in costs and payouts for needless accidents in the workplace | ED | 5. 16 degrees Celsius | Question According to the Health and Safety Executive around 25 workers die each year from using poorly maintained electrical equipment | 6. A person responsible for giving emergency treatment to employees in the workplace | Key Term First Aider | 7. A Document used to record hazards and risks | Key Term Risk Assessment | 8. Higher capacity computers that offer services to client computers that can connect to them | Key term Servers | 9. Agreed ways of doing things so that everyone on the internet connects in the same way | Key Term Internet Protocols | 10. Restricted computer network confined to a specific organisation | Key terms Intranet | 11. Restricted network that extends outside an organisation to include other computers | Key Term Extranet | 12. A way of connecting to the internet without physical wires | Key Term Wi-fi | 13. BrazilRussiaIndia and China are the leading countries in terms of growth in mobile phone subscription | Did You know | 14. Portable devices that can connect to the worldwide web | Key Term Mobile technology | 15. Openings in the software or networking arrangements of an e-business that allows intrusion data theft or virus infection | Key Term Security Threats | 16. A business that has digitised many of its internal functions by using computer systems often connected to the web | Key Term EBusiness | 17. Software services that can track users of websites, measure click through patterns and provide data to assist in web strategic planning | Key Term Web analytics | 18. Unsolicited emails often referred to as Junk Mail | Key Term SPAM | 19. A gateway site that offers may links into other sites related to the same theme | Key Term Portal | 20. Tailoring communications in order to attract sales from a specific group of people | Key Term Targeting a market | 21. The capability of a website to grow alongside the growth of the business | Key Term Website Scalability | 22. A pleasant and appropriate look and feel that is appropriate to the organisation | Key Term Visual Appeal | 23. The ease with which you can use a website | Key Term Usability | 24. The level of security of personal information | Key Term Privacy | 25. Text available on the web that contains hyperlinks to other web pages | Key Term Hypertext | 26. The facility on a web page to show streaming video or sounds to back up the textual information | Key Term Multimedia | 27. The creation of an easytospot identity that consumers get to know well | Key Term Brand Image | 28. The capacity of a website to make people stay on the site and eventually make a purchase | Key Term Website Stickiness | 29. A website being held on a server this is a service offered by ISP’s or specialist providers | Key Term Hosting | 30. Software packages that offer WYSIWYG user friendly environments for website design | Key Term Authoring Tools | 31. Tools to prove that someone is who they say they are when logging into a website | Key Term Authentication |
Question 1 (of 31)
Question 2 (of 31)
Question 3 (of 31)
Question 4 (of 31)
Question 5 (of 31)
Question 6 (of 31)
Question 7 (of 31)
Question 8 (of 31)
Question 9 (of 31)
Question 10 (of 31)
Question 11 (of 31)
Question 12 (of 31)
Question 13 (of 31)
Question 14 (of 31)
Question 15 (of 31)
Question 16 (of 31)
Question 17 (of 31)
Question 18 (of 31)
Question 19 (of 31)
Question 20 (of 31)
Question 21 (of 31)
Question 22 (of 31)
Question 23 (of 31)
Question 24 (of 31)
Question 25 (of 31)
Question 26 (of 31)
Question 27 (of 31)
Question 28 (of 31)
Question 29 (of 31)
Question 30 (of 31)
Question 31 (of 31)