Practice C.4 The evolving web with authentic IB Computer Science (CS) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like programming concepts, algorithms, and data structures. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
A university stores its research data on a private cloud, which is accessible only by faculty and students.
Define cloud computing and outline its difference from traditional client-server architecture.
Explain two benefits of using a private cloud for the university’s research data.
Describe one disadvantage of a private cloud model for this university.
Here's the formatted question in markdown:
Pugh University has a website that allows computer science students to enter their name and customize the web pages.
Consider the section of HTML and CSS code shown below.
File name: index.html
<!DOCTYPE html>
<html>
<body>
<script>
function setVar(){
var subject=document.getElementById('kippers').value;
document.getElementById('subj').innerHTML = subject;
}
</script>
<h2>My First Page</h2>
<p>Welcome to the <span id='subj'></span> Faculty</p>
<input type='text' id='kippers'/>
<button onclick='setVar();'/>clickme</button>
</body>
</html>
When a student enrolls, they must enter their name on a web page. Before being added to the database, the system should check that the name typed is not blank and that it has not already been added to the database.
Consider the following URL:
The common gateway interface (CGI) offers a standard protocol for web servers.
Pugh University uses cloud computing services, such as Google Docs or Office 365.
Describe how cloud computing is different to a client–server architecture.
Describe the working of the common gateway interface (CGI).
Explain why these two validation checks occur on different computer systems.
Describe the processing that takes place when the user inputs “Pugh” into the text box and then uses the clickmebutton.
Explain how website certificates are used to authenticate a user’s browser through secure protocol communications like HTTPS.
State the output of the index.htmlfile in the web browser.
Open source code is made available by a community of developers and is frequently updated. The code can be downloaded for free, but users must register with the website and have their access authenticated.
Authentication is based on signing in to an established third-party company, for example a user’s existing email or a social network account. The third-party company then verifies the user, granting them access to the open source code website.
The URL of this website is www.OpenSourceDev.org. Any new pieces of code that the developers make available become new resources on the website. A script generates weekly automatic notifications of new code available on the site, and sends this notification to users as an email.
Explain how the user’s privacy can be maintained whilst using this method of authentication.
Outline the steps that the script could perform for sending out these notifications.
Outline, with an example, how the URL for these new pieces of code will be generated.
A fragment of a script and a web form are provided below.
In the script some functions are not implemented, and only their specification is provided.
Describe the processing that occurs when the form is filled with the URL https://www.the2nd.org/bin.php?id=70 that the server discovers is associated with the IP address 172.16.254.1.
Evaluate the use of server-side scripting to provide the mechanism for registration.
An e-commerce company, ShopEase, operates a global online marketplace where users can buy and sell products. To protect user data, ShopEase employs identification and authentication protocols.
Define identification and authentication in the context of online security.
Explain one method of identification and one method of authentication that ShopEase might use.
Describe one potential impact on user privacy when both identification and authentication are required on ShopEase.
ConnectCo, a global communications company, is exploring a decentralized web model to provide internet services to users in areas with unreliable infrastructure. ConnectCo envisions a decentralized model where individual devices can act as network nodes to improve connectivity.
Define decentralized web and explain its relevance to ConnectCo’s model.
Outline one benefit and one drawback of a decentralized network model for internet services in remote areas.
Explain one challenge that ConnectCo may face in ensuring data consistency across decentralized nodes.
Describe one way open standards could support ConnectCo’s transition to a decentralized web model.
To what extent could a decentralized internet model impact international data accessibility?
The Large Hadron Collider at CERN in Switzerland produces an average of 15 petabytes (15 million gigabytes) of experimental data every year. This data must be accessed and analysed by scientists around the world.
CERN has established the Worldwide LHC Computing Grid.
With reference to the URL https://home.cern/topics/large-hadron-collider
State the protocol used.
With reference to the URL https://home.cern/topics/large-hadron-collider
Identify the steps taken by the domain name server when the scientist enters a URL such as https://home.cern into their web browser.
Instead of copyrighting its experimental results, CERN has decided to publish its experimental results using Creative Commons licensing.
Explain two reasons why CERN would publish its experimental results using Creative Commons licensing.
Explain two reasons why CERN would use grid computing to support its research.
A major search engine company wants to ensure its website and services comply with open standards to increase accessibility and interoperability.
Define open standards.
Explain two benefits of using open standards for web services.
Describe one limitation of relying on open standards for a web-based company.
An art museum, ArtVault, uses cloud storage to manage high-resolution images of its collection, which curators and researchers can access remotely. ArtVault recently switched from a private cloud to a public cloud model.
Define public cloud.
Explain one reason why ArtVault might have chosen a public cloud over a private cloud.
Outline one risk to data security when using a public cloud to store high-resolution images.
Describe two ways in which the cloud could enable ArtVault’s curators to work more collaboratively.
A non-profit organization, GreenAid, which operates in a less economically developed country (LEDC), uses old computers that have been donated to them. The organization relies on WiFi and satellite-based transmission for access to the Internet.
GreenAid is considering using a cloud-based service provided by a large IT company based in one of the more economically developed countries (MEDC).
Outline one technical challenge that GreenAid may encounter in setting up its own website with the technologies that it has available.
Explain how the use of cloud-based services may help GreenAid to overcome the limitations of the available technologies.
GreenAid wishes to improve its ranking in the major search engines.
Discuss whether GreenAid should use black hat search engine optimization techniques in order to improve its ranking.
Describe two problems this may cause for an organizsation such as GreenAid.
A startup company, FinSync, provides cloud-based accounting software for small businesses. Its services require users to upload sensitive financial data to the platform.
Outline two benefits for small businesses of using cloud-based software over traditional desktop software.
Describe one privacy risk associated with storing sensitive data on FinSync’s cloud platform.
Explain how FinSync might address privacy concerns to increase user trust.