QR Challenge: Unit 4 Review
Teacher Notes
A. Prior to the lesson:
1. Arrange students into groups. Each group needs at least ONE person who has a mobile device.
2. If their phone camera doesn't automatically detect and decode QR codes, ask students to
- Download a QR reader (e.g. I-Nigma | NeoReader | Kaywa) onto their mobile devices
- Bring these devices into the lesson.
3. Print out the QR codes.
4. Cut them out and place them around your class / school.
B. The lesson:
1. Give each group a clipboard and a piece of paper so they can write down the decoded questions and their answers to them.
2. Explain to the students that the codes are hidden around the school. Each team will get ONE point for each question they correctly decode and copy down onto their sheet, and a further TWO points if they can then provide the correct answer and write this down underneath the question.
3. Away they go! The winner is the first team to return with the most correct answers in the time available. This could be within a lesson, or during a lunchbreak, or even over several days!
C. TIPS / OTHER IDEAS
4. A detailed case study in how to set up a successful QR Scavenger Hunt using this tool can be found here.
Questions / Answers (teacher reference)
Question | Answer |
1. Describe three advantages of solid state drives compared with hard disk drives[3] |
|
2. Why might an organisation chose a hard disk drive rather than a solid state drive for their file server[1] |
| 3. Describe briefly the operation of a solid state drive[3] |
| 4. Describe briefly the operation of a hard disk drive[3] |
| 5. Explain what is meant by cloud storage[2] |
| 6. Give three advantages of cloud storage compared to local storage[3] |
| 7. A computer has 2000 megabytes of RAM, how many gigabytes of RAM does the computer have?[1] |
| 8. State two items that will be stored in RAM[2] |
| 9. The computer also has 2MB of cache memory, describe what is meant by cache memory and state why it is used[3] |
| 10. State one use of ROM in a computer[1] |
| 11. Explain why removable media can be a threat to the security of a network[2] |
| 12. Suggest two ways that computer users can leave themselves open to hackers[2] |
| 13. Explain with an example what is meant by blagging[2] |
| 14. What measure can a company take to reduce or eliminate incidents of blagging?[1] |
| 15. What is phishing[2] |
| 16. Describe two ways that it is often possible to detect a phishing email[2] |
| 17. Explain what is meant by shouldering[2] |
| 18. Describe one other way in which a criminal may obtain personal information about someone without their consent or knowledge[2] |
| 19. Describe two biometric methods of identification, and for each one, give an example of where it might be used(Give different examples for each method)[4] | |
Unit 4 Review: QR Challenge
https://www.classtools.net/QR/decode.php?text=Describe_three_advantages_of_solid_state_drives_compared_with_hard_disk_drives[3]
Question 1 (of 19)
Unit 4 Review: QR Challenge
https://www.classtools.net/QR/decode.php?text=Why_might_an_organisation_chose_a_hard_disk_drive_rather_than_a_solid_state_drive_for_their_file_server[1]
Question 2 (of 19)
Unit 4 Review: QR Challenge
https://www.classtools.net/QR/decode.php?text=Describe_briefly_the_operation_of_a_solid_state_drive[3]
Question 3 (of 19)
Unit 4 Review: QR Challenge
https://www.classtools.net/QR/decode.php?text=Describe_briefly_the_operation_of_a_hard_disk_drive[3]
Question 4 (of 19)
Unit 4 Review: QR Challenge
https://www.classtools.net/QR/decode.php?text=Explain_what_is_meant_by_cloud_storage[2]
Question 5 (of 19)
Unit 4 Review: QR Challenge
https://www.classtools.net/QR/decode.php?text=Give_three_advantages_of_cloud_storage_compared_to_local_storage[3]
Question 6 (of 19)
Unit 4 Review: QR Challenge
https://www.classtools.net/QR/decode.php?text=A_computer_has_2000_megabytes_of_RAM,_how_many_gigabytes_of_RAM_does_the_computer_have?[1]
Question 7 (of 19)
Unit 4 Review: QR Challenge
https://www.classtools.net/QR/decode.php?text=State_two_items_that_will_be_stored_in_RAM[2]
Question 8 (of 19)
Unit 4 Review: QR Challenge
https://www.classtools.net/QR/decode.php?text=The_computer_also_has_2MB_of_cache_memory,_describe_what_is_meant_by_cache_memory_and_state_why_it_is_used[3]
Question 9 (of 19)
Unit 4 Review: QR Challenge
https://www.classtools.net/QR/decode.php?text=State_one_use_of_ROM_in_a_computer[1]
Question 10 (of 19)
Unit 4 Review: QR Challenge
https://www.classtools.net/QR/decode.php?text=Explain_why_removable_media_can_be_a_threat_to_the_security_of_a_network[2]
Question 11 (of 19)
Unit 4 Review: QR Challenge
https://www.classtools.net/QR/decode.php?text=Suggest_two_ways_that_computer_users_can_leave_themselves_open_to_hackers[2]
Question 12 (of 19)
Unit 4 Review: QR Challenge
https://www.classtools.net/QR/decode.php?text=Explain_with_an_example_what_is_meant_by_blagging[2]
Question 13 (of 19)
Unit 4 Review: QR Challenge
https://www.classtools.net/QR/decode.php?text=What_measure_can_a_company_take_to_reduce_or_eliminate_incidents_of_blagging?[1]
Question 14 (of 19)
Unit 4 Review: QR Challenge
https://www.classtools.net/QR/decode.php?text=What_is_phishing[2]
Question 15 (of 19)
Unit 4 Review: QR Challenge
https://www.classtools.net/QR/decode.php?text=Describe_two_ways_that_it_is_often_possible_to_detect_a_phishing_email[2]
Question 16 (of 19)
Unit 4 Review: QR Challenge
https://www.classtools.net/QR/decode.php?text=Explain_what_is_meant_by_shouldering[2]
Question 17 (of 19)
Unit 4 Review: QR Challenge
https://www.classtools.net/QR/decode.php?text=Describe_one_other_way_in_which_a_criminal_may_obtain_personal_information_about_someone_without_their_consent_or_knowledge[2]
Question 18 (of 19)
Unit 4 Review: QR Challenge
https://www.classtools.net/QR/decode.php?text=Describe_two_biometric_methods_of_identification,_and_for_each_one,_give_an_example_of_where_it_might_be_used(Give_different_examples_for_each_method)[4]
Question 19 (of 19)