Practice 2.5 Space with authentic IB Digital Society (DS) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like systems and structures, human behavior and interaction, and digital technologies in society. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
Cloud networks allow for data storage and access over the internet, making data accessible from anywhere. This accessibility supports remote work, file sharing, and collaboration but also raises concerns about data security and control over personal information.
Evaluate the impact of cloud networks on data accessibility, considering the benefits for remote work and the potential security risks.
Drones are widely used for surveillance in law enforcement and border control. While they enhance monitoring capabilities and can improve public safety, drones also raise concerns about privacy, consent, and the potential misuse of surveillance technology in public and private spaces.
Discuss the impact of drone technology on public surveillance and privacy, considering both the benefits for security and the ethical implications for individual privacy rights.
Firewalls are critical for network security, acting as barriers between internal networks and external threats. They control incoming and outgoing traffic, protecting against unauthorized access and cyber attacks. However, configuring firewalls effectively can be challenging, especially in large organizations.
Evaluate the role of firewalls in securing organizational networks, considering their effectiveness and potential challenges in implementation.
Malicious software (malware) is a significant threat to users of personal devices, as it can steal sensitive information, disrupt services, or even cause financial losses. With increased connectivity, devices are more vulnerable to these attacks, raising ethical questions about responsibility in cybersecurity.
Evaluate the ethical responsibilities of software developers and users in preventing the spread of malicious software on personal devices.
Moore’s Law has driven rapid advancements in technology by predicting that the number of transistors on a chip doubles approximately every two years. This trend has influenced the affordability, size, and power of devices like smartphones and laptops, though some predict Moore’s Law may be slowing down.
Discuss the significance of Moore’s Law in shaping the development of personal computing devices, including potential consequences if the law’s trend no longer holds true.
Discuss the decision for an owner of an art gallery to develop a virtual tour that is accessible online.
User interfaces (UI) are critical in making devices accessible to a diverse range of users. For example, voice-activated interfaces, like those on smartphones, allow individuals with limited mobility to use devices effectively. While these interfaces promote inclusivity, there are challenges, such as accuracy and user privacy, that can affect their effectiveness.
Evaluate the effectiveness of user interfaces, such as voice and graphic interfaces, in promoting accessibility in computing, considering both the benefits for users with disabilities and the associated technical challenges.
Facial recognition algorithms, used for security in airports, rely on large datasets and are sometimes criticized for algorithmic bias. For instance, these algorithms have been known to misidentify individuals of certain racial backgrounds, raising fairness and transparency issues.
Identify two issues related to algorithmic bias in facial recognition software.
Explain why transparency is essential for accountability in facial recognition algorithms used in security.
Discuss one risk associated with “black box” algorithms in facial recognition systems.
Evaluate the impact of algorithmic bias on fairness in facial recognition, particularly concerning racial and ethnic disparities.
Data storage (like hard drives and SSDs) holds files permanently, while memory (RAM) stores temporary data, supporting the computer’s processing needs. Effective storage and memory are critical to speed and multitasking abilities in devices from smartphones to mainframes.
For example, an SSD in a laptop allows fast data retrieval, boosting performance for tasks like video editing and gaming.
Wearable computers, such as smartwatches and fitness trackers, integrate technology into daily life, providing health monitoring, communication, and real-time data tracking. These devices are lightweight and adaptable, making them practical for continuous use.
For instance, a smartwatch can monitor heart rate, track physical activity, and send alerts, helping users maintain their health goals.
Moore’s Law states that the number of transistors in a microchip doubles approximately every two years, boosting processing power. This principle has driven computing advancements, leading to smaller, faster, and more efficient devices.
For example, Moore’s Law facilitated the evolution from bulky desktop computers to powerful smartphones that fit in a pocket.
User interfaces (UIs) allow people to interact with computers. Graphical user interfaces (GUIs) use icons and visuals to make navigation intuitive, while haptic interfaces provide touch feedback, enhancing the tactile experience in applications like gaming and virtual reality.
For example, smartphones combine haptic feedback with touchscreens, making interactions more intuitive for users.
With reference to Source A, explain the difference between data storage and memory, including one example of each.
With reference to Source B, describe two ways wearable devices integrate technology into daily life.
With reference to Source C, outline the impact of Moore’s Law on the evolution of computing devices.
With reference to Source D, identify two types of user interfaces and describe their functions in enhancing user interaction.
With reference to Sources A–D and your own knowledge, discuss the implications of technological advancements in computing on user experience and lifestyle. Include examples of at least two advancements.
Computing networks enable connectivity across different scales and purposes, from Local Area Networks (LANs) within buildings to Wide Area Networks (WANs) spanning cities. Virtual Private Networks (VPNs) enhance security, while Client-Server and Peer-to-Peer (P2P) architectures support various communication methods.
For instance, a VPN can secure remote employee access to a company’s intranet, and LANs connect devices within a corporate office to share resources efficiently.
The effectiveness of networks depends on critical components such as clients, servers, routers, and switches. Modems connect devices to the internet, while network interfaces enable devices to join a network. These elements, together with wired and wireless media, make data transmission feasible across distances.
For example, a modem connects a home router to an internet service provider (ISP), enabling users to access the internet and local network resources.
Networks rely on transmission media for data transfer. Wired media (e.g., Ethernet and fiber-optic cables) provide high-speed, reliable connections, while wireless media (e.g., Wi-Fi and cellular networks) enable mobility. Each medium has specific advantages depending on the application.
For instance, fiber-optic cables support high-speed internet in metropolitan areas, while Wi-Fi enables device connectivity within homes and offices without physical cabling.
Protocols define communication standards for data exchange across networks. TCP/IP is foundational for the internet, while HTTP supports web browsing. Protocols like FTP and SMTP enable file transfers and email communication, respectively.
For example, TCP/IP underpins internet connections, ensuring data packets are transmitted between devices without data loss, even over long distances.
With reference to Source A, identify two types of computing networks and describe one specific application for each.
With reference to Source B, explain the roles of a modem and a network interface in enabling network connectivity.
With reference to Source C, outline one advantage of using wired media and one advantage of using wireless media in networks.
With reference to Source D, describe the function of the TCP/IP protocol in network communication.
With reference to Sources A–D and your own knowledge, discuss how network types, components, and protocols facilitate efficient data communication across different environments. Provide examples to support your answer.