PREMIUM LOGIN
ClassTools Premium membership gives access to all templates, no advertisements, personal branding and many other benefits!
Username: | ||
Password: | ||
Submit
Cancel
|
||
Not a member? |
1. Arrange students into groups. Each group needs at least ONE person who has a mobile device.
2. If their phone camera doesn't automatically detect and decode QR codes, ask students to
4. Cut them out and place them around your class / school.
1. Give each group a clipboard and a piece of paper so they can write down the decoded questions and their answers to them.
2. Explain to the students that the codes are hidden around the school. Each team will get ONE point for each question they correctly decode and copy down onto their sheet, and a further TWO points if they can then provide the correct answer and write this down underneath the question.
3. Away they go! The winner is the first team to return with the most correct answers in the time available. This could be within a lesson, or during a lunchbreak, or even over several days!
4. A detailed case study in how to set up a successful QR Scavenger Hunt using this tool can be found here.
Question | Answer |
1. 1. What does "www" stand for? | World Wide Web | 2. 2. Which is the name of the software used to view webpages? | Web Browser | 3. 3. ISP stands for what? | Internet Service Provider | 4. 4. How much is a collection of 1024 bytes? | 1KB | 5. 5. What protocol is used to transfer data across the internet? | TCP/IP | 6. 6. What does ISDN stand for? | Integrated Services Digital Networks | 7. 7. What does this HTML source do - ![]() | inserts an image called dog.jpg | 8. 8. What is artificial intelligence? | Artificial Intelligence is a branch of computer science concerned with the study and creation of systems that exhibit some form of human intelligence | 9. 9. What is the name of the unique identifier of any device connected to a network? | IP Address | 10. 10. It provides a standard hierarchical way of identifying and locating internet resources on the WWW. Name it. | Uniform Resource Locator | 11. 11. In computer science, what word describes a self-contained sequence of actions to be performed? | Algorithm | 12. 12. What is the name given to unsolicited e-mail messages? | Spam | 13. 13. What is the name of the protocol used to receive emails? | POP3 | 14. 14. A computer uses which type of numbering system to calculate and store data? | Binary | 15. 15.What is the binary value of 'A'? | 01000001 |
Question 1 (of 15)
Question 2 (of 15)
Question 3 (of 15)
Question 4 (of 15)
Question 5 (of 15)
Question 6 (of 15)
Question 7 (of 15)
Question 8 (of 15)
Question 9 (of 15)
Question 10 (of 15)
Question 11 (of 15)
Question 12 (of 15)
Question 13 (of 15)
Question 14 (of 15)
Question 15 (of 15)