Practice 3.1 Data with authentic IB Digital Society (DS) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like systems and structures, human behavior and interaction, and digital technologies in society. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
Sentencing criminals using artificial intelligence (AI)
In 10 states in the United States, artificial intelligence (AI) software is used for sentencing criminals. Once criminals are found guilty, judges need to determine the lengths of their prison sentences. One factor used by judges is the likelihood of the criminal re-offending*.
The AI software uses machine learning to determine how likely it is that a criminal will re-offend. This result is presented as a percentage; for example, the criminal has a 90 % chance of re-offending. Research has indicated that AI software is often, but not always, more reliable than human judges in predicting who is likely to re-offend.
There is general support for identifying people who are unlikely to re-offend, as they do not need to be sent to prisons that are already overcrowded.
Recently, Eric Loomis was sentenced by the state of Wisconsin using proprietary AI software. Eric had to answer over 100 questions to provide the AI software with enough information for it to decide the length of his sentence. When Eric was given a six-year sentence, he appealed and wanted to see the algorithms that led to this sentence. Eric lost the appeal.
On the other hand, the European Union (EU) has passed a law that allows citizens to challenge decisions made by algorithms in the criminal justice system.
* re-offending: committing another crime in the future
Identify two characteristics of artificial intelligence (AI) systems.
Outline one problem that may arise if proprietary software rather than open-source software is used to develop algorithms.
The developers of the AI software decided to use supervised machine learning to develop the algorithms in the sentencing software.
Identify two advantages of using supervised learning.
The developers of the AI software used visualizations as part of the development process.
Explain one reason why visualizations would be used as part of the development process.
Explain two problems the developers of the AI system could encounter when gathering the data that will be input into the AI system.
To what extent should the decisions of judges be based on algorithms rather than their knowledge and experience?
Cloud networks allow for data storage and access over the internet, making data accessible from anywhere. This accessibility supports remote work, file sharing, and collaboration but also raises concerns about data security and control over personal information.
Evaluate the impact of cloud networks on data accessibility, considering the benefits for remote work and the potential security risks.
Students should be provided with the pre-release document ahead of the May 2018 HL paper 3 examination, this can be found under the 'Your tests' tab > supplemental materials > May 2018 HL paper 3 pre-release document: Accessibility.
Improving the accessibility to the curriculum for children with special educational needs and disabilities (SEND)
Source 1: Tayton School
Tayton School is a primary school that teaches 500 children aged between 5 and 12. There are three classes in each year group, with a maximum of 24 students in each class. The school’s motto is “Education for Everyone”, and inclusion is at the heart of the school’s mission.
The school’s Inclusion Department consists of five full-time staff, led by Sandra, and 10 learning support assistants who are active in working with the children. Sandra has recently produced a report on the students with special educational needs and disabilities (SEND) in the school, in which she found that the increasing numbers of students, and the types of SEND, means that the schools needs to invest in expanding the amount of support for the students (see Table 1).
Table 1: SEND at Tayton School

Sandra’s report argues that, next year, the work of the Inclusion Department would be more effective if the school purchased educational digital technologies, such as social robots and assistive technologies.
Source 2: Social robots in education
Sandra researched social robots and came back to the department meeting with this information:
In 2020, a report on the use of social robots in education was published by a prestigious university professor, who concluded that social robots have the potential to be a key player in education in the way textbooks and whiteboards have been in the past. A social robot has the potential to support students in ways that could never have been envisaged 20 years ago. However, there are significant technical limitations, particularly linked to the social robot’s ability to interact with students, that will restrict their usability for the next few years
Source 3: Mary sees the positives
Mary, one of the learning assistants at Tayton School, says:
“As a parent of two school-age children, I think the potential introduction of social robots has both advantages and disadvantages. My children thought the idea of having a robot that sits with them very exciting, and I think they would do what the robot asks without questioning it. The robot will also be much more patient while they are learning their times tables!” (See Figure 1).
Figure 1: Students interacting with a social robot

Source 4: James has doubts
James, another learning assistant at Tayton School, is wary of the overuse of digital technology in schools for children with special needs based on his experiences in other schools. He has found some research that supports his ideas.

The types of data collected in modern digital societies are diverse and can be classified into several categories. Quantitative data, such as statistical or financial records, provide numerical insights, while qualitative data, such as user reviews or interviews, offer context and understanding. From geographical and meteorological to medical data, these different types serve various purposes.
For example, data collected in scientific research might include both statistical results (quantitative) and patient experiences (qualitative). This comprehensive view helps in drawing conclusions that are both statistically valid and contextually rich.
Metadata is another critical type of data that describes other data, aiding in its categorization and retrieval. For instance, a photograph's metadata might include the time it was taken, the camera model, and the geolocation, which aids in organizing vast image collections.
Data analytics involves extracting meaningful insights by identifying trends, patterns, and relationships within large datasets. For instance, companies analyze customer purchase data to model and predict future consumer behavior. This has applications ranging from personalized marketing strategies to more accurate forecasting of demand for products.
Moreover, the increasing availability of big data has enabled researchers to analyze complex relationships between different types of data, such as correlating cultural, financial, and meteorological data to predict economic impacts of climate change. The ability to organize measurable facts about both people and systems allows for a more comprehensive understanding of digital society.
The data life cycle describes the stages through which data passes, from its creation or collection to its reuse. Initially, data is either collected or extracted through primary methods like surveys or through secondary sources such as previously existing databases. The data is then stored in databases, where it can be processed and analyzed to extract insights.
For example, medical research data might undergo multiple stages of this cycle. After being collected, it is stored securely, processed to anonymize patient information, and then analyzed to identify health trends. Data also needs to be preserved for future research and can be reused in subsequent studies, ensuring that its value extends beyond the initial analysis.
Refer to Source A. Identify two stages in the DIKW pyramid and explain their differences.
Using Source B, Discuss the importance of metadata in organizing different types of data.
Refer to Source C. Explain how companies use data analytics to predict human behavior. Provide one example.
Based on Source D, Describe two key stages of the data life cycle in healthcare, and explain their significance.
Compare and contrast Source B and Source D, focusing on how they address data organization and reuse.
With reference to Sources A-D and your own knowledge, Discuss the opportunities and challenges presented by big data analytics in modern society.
Data can be collected in various ways, including primary and secondary methods, and is often organized into databases to ensure it is structured, accessible, and manageable. How we organize data affects its usability and relevance.
Distinguish between primary and secondary data collection, providing one example of each.
Explain how databases organize and structure data to ensure accessibility.
The role of portable digital devices in health
Jaime is an athlete and uses his sports watch to monitor his training sessions. He also uses it to keep a record of his health and well-being. The sports watch can monitor Jaime’s vital signs. It is also global positioning systems (GPS) enabled, so it can track his location (see Figure 4).
Figure 4: Data collected by a sports watch

The information that is recorded by Jaime’s sports watch is synchronized with a mobile application (app) installed on his cellphone/mobile phone.
Identify two vital signs that can be recorded by Jaime’s sports watch.
Identify the steps that the GPS receiver in Jaime’s sports watch uses to show the routes of his training runs.
Jaime has decided to share his personal health information with researchers at the University of Sierra Nevada.
Analyse Jaime’s decision to share his personal health information with the University of Sierra Nevada.
The development of mobile health apps has changed the way citizens manage their own health and well-being.
Discuss whether citizens like Jaime should rely only on the advice of a health app to manage their own health and well-being.
Wildfire modelling
The fire control centre in the Kinakora National Park in New Zealand often has to cope with the natural phenomenon of wildfires. Staff have been collecting data about wildfires since 1970.
The size of each wildfire is measured, and the vegetation types affected are recorded. Data on the weather conditions is collected from sensors in the park. The staff at the fire control centre use this information to fight the wildfire.
A new computer modelling system is being developed using data collected from previous wildfires. This new system will improve the quality of the information available when fighting future wildfires.
The new system will also enable staff at Kinakora National Park to send information to tourists in the park to warn them when they are in danger from a wildfire.
Identify two measurements that could be taken by the weather sensors in Kinakora National Park.
Identify two methods that could be used to train the staff to use the new computer modelling system.
Identify two methods of visualization that could be used to present information from the new computer modelling system.
Two methods for informing tourists about wildfires in Kinakora National Park are:
Analyse these two methods.
Evaluate Kinakora National Park’s decision to use computer modelling to develop strategies for dealing with wildfires.
Firewalls are critical for network security, acting as barriers between internal networks and external threats. They control incoming and outgoing traffic, protecting against unauthorized access and cyber attacks. However, configuring firewalls effectively can be challenging, especially in large organizations.
Evaluate the role of firewalls in securing organizational networks, considering their effectiveness and potential challenges in implementation.
Malicious software (malware) is a significant threat to users of personal devices, as it can steal sensitive information, disrupt services, or even cause financial losses. With increased connectivity, devices are more vulnerable to these attacks, raising ethical questions about responsibility in cybersecurity.
Evaluate the ethical responsibilities of software developers and users in preventing the spread of malicious software on personal devices.
Cameras in school
The principal at Flynn School has received requests from parents saying that they would like to monitor their children’s performance in school more closely. He is considering extending the school’s IT system by installing cameras linked to facial recognition software that can record student behaviour in lessons.
The facial recognition software can determine a student’s attention level and behaviour, such as identifying if they are listening, answering questions, talking with other students, or sleeping. The software uses machine learning to analyse each student’s behaviour and gives them a weekly score that is automatically emailed to their parents.
The principal claims that monitoring students’ behaviour more closely will improve the teaching and learning that takes place.
Discuss whether Flynn School should introduce a facial recognition system that uses machine learning to analyse each student’s behaviour and give them a score that is automatically emailed to their parents.
Practice 3.1 Data with authentic IB Digital Society (DS) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like systems and structures, human behavior and interaction, and digital technologies in society. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
Sentencing criminals using artificial intelligence (AI)
In 10 states in the United States, artificial intelligence (AI) software is used for sentencing criminals. Once criminals are found guilty, judges need to determine the lengths of their prison sentences. One factor used by judges is the likelihood of the criminal re-offending*.
The AI software uses machine learning to determine how likely it is that a criminal will re-offend. This result is presented as a percentage; for example, the criminal has a 90 % chance of re-offending. Research has indicated that AI software is often, but not always, more reliable than human judges in predicting who is likely to re-offend.
There is general support for identifying people who are unlikely to re-offend, as they do not need to be sent to prisons that are already overcrowded.
Recently, Eric Loomis was sentenced by the state of Wisconsin using proprietary AI software. Eric had to answer over 100 questions to provide the AI software with enough information for it to decide the length of his sentence. When Eric was given a six-year sentence, he appealed and wanted to see the algorithms that led to this sentence. Eric lost the appeal.
On the other hand, the European Union (EU) has passed a law that allows citizens to challenge decisions made by algorithms in the criminal justice system.
* re-offending: committing another crime in the future
Identify two characteristics of artificial intelligence (AI) systems.
Outline one problem that may arise if proprietary software rather than open-source software is used to develop algorithms.
The developers of the AI software decided to use supervised machine learning to develop the algorithms in the sentencing software.
Identify two advantages of using supervised learning.
The developers of the AI software used visualizations as part of the development process.
Explain one reason why visualizations would be used as part of the development process.
Explain two problems the developers of the AI system could encounter when gathering the data that will be input into the AI system.
To what extent should the decisions of judges be based on algorithms rather than their knowledge and experience?
Cloud networks allow for data storage and access over the internet, making data accessible from anywhere. This accessibility supports remote work, file sharing, and collaboration but also raises concerns about data security and control over personal information.
Evaluate the impact of cloud networks on data accessibility, considering the benefits for remote work and the potential security risks.
Students should be provided with the pre-release document ahead of the May 2018 HL paper 3 examination, this can be found under the 'Your tests' tab > supplemental materials > May 2018 HL paper 3 pre-release document: Accessibility.
Improving the accessibility to the curriculum for children with special educational needs and disabilities (SEND)
Source 1: Tayton School
Tayton School is a primary school that teaches 500 children aged between 5 and 12. There are three classes in each year group, with a maximum of 24 students in each class. The school’s motto is “Education for Everyone”, and inclusion is at the heart of the school’s mission.
The school’s Inclusion Department consists of five full-time staff, led by Sandra, and 10 learning support assistants who are active in working with the children. Sandra has recently produced a report on the students with special educational needs and disabilities (SEND) in the school, in which she found that the increasing numbers of students, and the types of SEND, means that the schools needs to invest in expanding the amount of support for the students (see Table 1).
Table 1: SEND at Tayton School

Sandra’s report argues that, next year, the work of the Inclusion Department would be more effective if the school purchased educational digital technologies, such as social robots and assistive technologies.
Source 2: Social robots in education
Sandra researched social robots and came back to the department meeting with this information:
In 2020, a report on the use of social robots in education was published by a prestigious university professor, who concluded that social robots have the potential to be a key player in education in the way textbooks and whiteboards have been in the past. A social robot has the potential to support students in ways that could never have been envisaged 20 years ago. However, there are significant technical limitations, particularly linked to the social robot’s ability to interact with students, that will restrict their usability for the next few years
Source 3: Mary sees the positives
Mary, one of the learning assistants at Tayton School, says:
“As a parent of two school-age children, I think the potential introduction of social robots has both advantages and disadvantages. My children thought the idea of having a robot that sits with them very exciting, and I think they would do what the robot asks without questioning it. The robot will also be much more patient while they are learning their times tables!” (See Figure 1).
Figure 1: Students interacting with a social robot

Source 4: James has doubts
James, another learning assistant at Tayton School, is wary of the overuse of digital technology in schools for children with special needs based on his experiences in other schools. He has found some research that supports his ideas.

The types of data collected in modern digital societies are diverse and can be classified into several categories. Quantitative data, such as statistical or financial records, provide numerical insights, while qualitative data, such as user reviews or interviews, offer context and understanding. From geographical and meteorological to medical data, these different types serve various purposes.
For example, data collected in scientific research might include both statistical results (quantitative) and patient experiences (qualitative). This comprehensive view helps in drawing conclusions that are both statistically valid and contextually rich.
Metadata is another critical type of data that describes other data, aiding in its categorization and retrieval. For instance, a photograph's metadata might include the time it was taken, the camera model, and the geolocation, which aids in organizing vast image collections.
Data analytics involves extracting meaningful insights by identifying trends, patterns, and relationships within large datasets. For instance, companies analyze customer purchase data to model and predict future consumer behavior. This has applications ranging from personalized marketing strategies to more accurate forecasting of demand for products.
Moreover, the increasing availability of big data has enabled researchers to analyze complex relationships between different types of data, such as correlating cultural, financial, and meteorological data to predict economic impacts of climate change. The ability to organize measurable facts about both people and systems allows for a more comprehensive understanding of digital society.
The data life cycle describes the stages through which data passes, from its creation or collection to its reuse. Initially, data is either collected or extracted through primary methods like surveys or through secondary sources such as previously existing databases. The data is then stored in databases, where it can be processed and analyzed to extract insights.
For example, medical research data might undergo multiple stages of this cycle. After being collected, it is stored securely, processed to anonymize patient information, and then analyzed to identify health trends. Data also needs to be preserved for future research and can be reused in subsequent studies, ensuring that its value extends beyond the initial analysis.
Refer to Source A. Identify two stages in the DIKW pyramid and explain their differences.
Using Source B, Discuss the importance of metadata in organizing different types of data.
Refer to Source C. Explain how companies use data analytics to predict human behavior. Provide one example.
Based on Source D, Describe two key stages of the data life cycle in healthcare, and explain their significance.
Compare and contrast Source B and Source D, focusing on how they address data organization and reuse.
With reference to Sources A-D and your own knowledge, Discuss the opportunities and challenges presented by big data analytics in modern society.
Data can be collected in various ways, including primary and secondary methods, and is often organized into databases to ensure it is structured, accessible, and manageable. How we organize data affects its usability and relevance.
Distinguish between primary and secondary data collection, providing one example of each.
Explain how databases organize and structure data to ensure accessibility.
The role of portable digital devices in health
Jaime is an athlete and uses his sports watch to monitor his training sessions. He also uses it to keep a record of his health and well-being. The sports watch can monitor Jaime’s vital signs. It is also global positioning systems (GPS) enabled, so it can track his location (see Figure 4).
Figure 4: Data collected by a sports watch

The information that is recorded by Jaime’s sports watch is synchronized with a mobile application (app) installed on his cellphone/mobile phone.
Identify two vital signs that can be recorded by Jaime’s sports watch.
Identify the steps that the GPS receiver in Jaime’s sports watch uses to show the routes of his training runs.
Jaime has decided to share his personal health information with researchers at the University of Sierra Nevada.
Analyse Jaime’s decision to share his personal health information with the University of Sierra Nevada.
The development of mobile health apps has changed the way citizens manage their own health and well-being.
Discuss whether citizens like Jaime should rely only on the advice of a health app to manage their own health and well-being.
Wildfire modelling
The fire control centre in the Kinakora National Park in New Zealand often has to cope with the natural phenomenon of wildfires. Staff have been collecting data about wildfires since 1970.
The size of each wildfire is measured, and the vegetation types affected are recorded. Data on the weather conditions is collected from sensors in the park. The staff at the fire control centre use this information to fight the wildfire.
A new computer modelling system is being developed using data collected from previous wildfires. This new system will improve the quality of the information available when fighting future wildfires.
The new system will also enable staff at Kinakora National Park to send information to tourists in the park to warn them when they are in danger from a wildfire.
Identify two measurements that could be taken by the weather sensors in Kinakora National Park.
Identify two methods that could be used to train the staff to use the new computer modelling system.
Identify two methods of visualization that could be used to present information from the new computer modelling system.
Two methods for informing tourists about wildfires in Kinakora National Park are:
Analyse these two methods.
Evaluate Kinakora National Park’s decision to use computer modelling to develop strategies for dealing with wildfires.
Firewalls are critical for network security, acting as barriers between internal networks and external threats. They control incoming and outgoing traffic, protecting against unauthorized access and cyber attacks. However, configuring firewalls effectively can be challenging, especially in large organizations.
Evaluate the role of firewalls in securing organizational networks, considering their effectiveness and potential challenges in implementation.
Malicious software (malware) is a significant threat to users of personal devices, as it can steal sensitive information, disrupt services, or even cause financial losses. With increased connectivity, devices are more vulnerable to these attacks, raising ethical questions about responsibility in cybersecurity.
Evaluate the ethical responsibilities of software developers and users in preventing the spread of malicious software on personal devices.
Cameras in school
The principal at Flynn School has received requests from parents saying that they would like to monitor their children’s performance in school more closely. He is considering extending the school’s IT system by installing cameras linked to facial recognition software that can record student behaviour in lessons.
The facial recognition software can determine a student’s attention level and behaviour, such as identifying if they are listening, answering questions, talking with other students, or sleeping. The software uses machine learning to analyse each student’s behaviour and gives them a weekly score that is automatically emailed to their parents.
The principal claims that monitoring students’ behaviour more closely will improve the teaching and learning that takes place.
Discuss whether Flynn School should introduce a facial recognition system that uses machine learning to analyse each student’s behaviour and give them a score that is automatically emailed to their parents.