Practice 3.3 Computers with authentic IB Digital Society (DS) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like systems and structures, human behavior and interaction, and digital technologies in society. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
Cloud networks allow for data storage and access over the internet, making data accessible from anywhere. This accessibility supports remote work, file sharing, and collaboration but also raises concerns about data security and control over personal information.
Evaluate the impact of cloud networks on data accessibility, considering the benefits for remote work and the potential security risks.
The UN secretary-general has called for states to conclude a new international treaty by 2026 to prohibit weapons systems without human control or oversight and that cannot be used in compliance with international humanitarian law. The treaty should regulate all types of autonomous weapons systems. The report reflects 58 submissions from over 73 countries and 33 submissions from the International Committee of the Red Cross and civil society groups. The UN General Assembly is considered a venue for inclusive discussions on autonomous weapons systems, considering international peace and security concerns.
On 27 March 2020, the Prime Minister of Libya, Faiez Serraj, announced the commencement of Operation PEACE STORM, which moved GNA-AF to the offensive along the coastal littoral. The combination of the Gabya-class frigates and Korkut short-range air defence systems provided a capability to place a mobile air defence bubble around GNA-AF ground units, which took Hafter Affiliated Forces (HAF) air assets out of the military equation. Libya classifies HAF as a terrorist rebel organization. The enhanced operational intelligence capability included Turkish-operated signal intelligence and the intelligence, surveillance and reconnaissance provided by Bayraktar TB-2 and probably TAI Anka S unmanned combat aerial vehicles. This allowed for the development of an asymmetrical war of attrition designed to degrade HAF ground unit capability. The GNA-AF breakout of Tripoli was supported with Firtina T155 155 mm self-propelled guns and T-122 Sakarya multi-launch rocket systems firing extended range precision munitions against the mid-twentieth century main battle tanks and heavy artillery used by HAF.
Logistics convoys and retreating HAF were subsequently hunted down and remotely engaged by the unmanned combat aerial vehicles or the lethal autonomous weapons systems such as the STM Kargu-2 (see annex 30) and other loitering munitions. The lethal autonomous weapons systems were programmed to attack targets without requiring data connectivity between the operator and the munition: in effect, a true ‘fire, forget and find’ capability. The unmanned combat aerial vehicles and the small drone intelligence, surveillance and reconnaissance capability of HAF were neutralized by electronic jamming from the Koral electronic warfare system.
In the autumn of 2001, however, the United States was unwilling to launch a full-scale land invasion in a region 7000 miles from home. Instead, a plan evolved to send into Afghanistan a small number of CIA agents and Special Forces in support of anti-Taliban militias, with the aid of the US Air Force. That first October night was a powerful display of coordination involving laser- guided munitions dropped from the air and Tomahawk cruise missiles launched from the sea. General Tommy Franks, who then led the US Central Command (CENTCOM), the military command overseeing operations in Afghanistan, wrote in his memoir American Soldier that the assault involved in total some 40,000 personnel, 393 aircraft, and 32 ships. But one aircraft did not feature at all in the Air Force’s complex planning: a tiny, CIA-controlled, propeller-driven spy drone, Predator tailfin number 3034 which had crept into Afghanistan some hours earlier. It now hangs suspended in the Smithsonian Air and Space Museum in Washington, D.C., its place in history assured. Yet its actions that first night of the war – in which numerous agencies in the vast US military-intelligence machine each played sharply contradictory roles – remain steeped in controversy.
Human Rights Watch released a report stating that representatives from around 50 countries will meet in the summer of 2021 at the UN to discuss worldwide policy alignment on ‘killer robots’ or ‘lethal autonomous weapons systems’. In their report, Human Rights Watch expressed objections to delegating lethal force to machines without the presence of meaningful human control. Bonnie Docherty, senior arms research at Human Rights Watch said: ‘The fundamental moral, legal and security concerns raised by autonomous weapons systems warrant a strong and urgent response in the form of a new international treaty ... International law needs to be expanded to create new rules that ensure human control and accountability in the use of force.’ Human Rights Watch proposes a treaty that covers the use of all weapons that operate autonomously that includes limitations and restrictions such as banning the use of killer robots, with many claims reinforcing that meaningful human control must be involved in the selection and engagement of targets. It goes on to define the scope and prevalence of ‘meaningful human control’ to ensure that humans have access to the data, risks and potential impacts prior to authorizing an attack.
With reference to Source A, identify two different or unexpected impacts of ‘killer robots’.
With reference to Source D, explain why it may be difficult to reach global agreement on ‘killer robot’ policy.
Compare and contrast how Sources B and C present their messages of events involving unmanned combat aerial vehicles events.
With reference to the sources and your own knowledge, evaluate the decision to ban automated military technology.
Firewalls are critical for network security, acting as barriers between internal networks and external threats. They control incoming and outgoing traffic, protecting against unauthorized access and cyber attacks. However, configuring firewalls effectively can be challenging, especially in large organizations.
Evaluate the role of firewalls in securing organizational networks, considering their effectiveness and potential challenges in implementation.
Malicious software (malware) is a significant threat to users of personal devices, as it can steal sensitive information, disrupt services, or even cause financial losses. With increased connectivity, devices are more vulnerable to these attacks, raising ethical questions about responsibility in cybersecurity.
Evaluate the ethical responsibilities of software developers and users in preventing the spread of malicious software on personal devices.
Moore’s Law has driven rapid advancements in technology by predicting that the number of transistors on a chip doubles approximately every two years. This trend has influenced the affordability, size, and power of devices like smartphones and laptops, though some predict Moore’s Law may be slowing down.
Discuss the significance of Moore’s Law in shaping the development of personal computing devices, including potential consequences if the law’s trend no longer holds true.
Can digital technologies be used sustainably?
Many organizations claim that the most efficient use of information technology (IT) equipment, such as laptops and printers, is to replace them on a regular basis. For example, an organization’s strategy may be to do this every three years.
Other organizations purchase IT equipment that can easily be upgraded by increasing the storage and memory or upgrading the processing capabilities only when required. They claim they do not need to replace their IT equipment on such a regular basis and believe this is a more sustainable practice.
Evaluate the sustainability of these two strategies.
User interfaces (UI) are critical in making devices accessible to a diverse range of users. For example, voice-activated interfaces, like those on smartphones, allow individuals with limited mobility to use devices effectively. While these interfaces promote inclusivity, there are challenges, such as accuracy and user privacy, that can affect their effectiveness.
Evaluate the effectiveness of user interfaces, such as voice and graphic interfaces, in promoting accessibility in computing, considering both the benefits for users with disabilities and the associated technical challenges.
Data storage (like hard drives and SSDs) holds files permanently, while memory (RAM) stores temporary data, supporting the computer’s processing needs. Effective storage and memory are critical to speed and multitasking abilities in devices from smartphones to mainframes.
For example, an SSD in a laptop allows fast data retrieval, boosting performance for tasks like video editing and gaming.
Wearable computers, such as smartwatches and fitness trackers, integrate technology into daily life, providing health monitoring, communication, and real-time data tracking. These devices are lightweight and adaptable, making them practical for continuous use.
For instance, a smartwatch can monitor heart rate, track physical activity, and send alerts, helping users maintain their health goals.
Moore’s Law states that the number of transistors in a microchip doubles approximately every two years, boosting processing power. This principle has driven computing advancements, leading to smaller, faster, and more efficient devices.
For example, Moore’s Law facilitated the evolution from bulky desktop computers to powerful smartphones that fit in a pocket.
User interfaces (UIs) allow people to interact with computers. Graphical user interfaces (GUIs) use icons and visuals to make navigation intuitive, while haptic interfaces provide touch feedback, enhancing the tactile experience in applications like gaming and virtual reality.
For example, smartphones combine haptic feedback with touchscreens, making interactions more intuitive for users.
With reference to Source A, explain the difference between data storage and memory, including one example of each.
With reference to Source B, describe two ways wearable devices integrate technology into daily life.
With reference to Source C, outline the impact of Moore’s Law on the evolution of computing devices.
With reference to Source D, identify two types of user interfaces and describe their functions in enhancing user interaction.
With reference to Sources A–D and your own knowledge, discuss the implications of technological advancements in computing on user experience and lifestyle. Include examples of at least two advancements.
Computing networks enable connectivity across different scales and purposes, from Local Area Networks (LANs) within buildings to Wide Area Networks (WANs) spanning cities. Virtual Private Networks (VPNs) enhance security, while Client-Server and Peer-to-Peer (P2P) architectures support various communication methods.
For instance, a VPN can secure remote employee access to a company’s intranet, and LANs connect devices within a corporate office to share resources efficiently.
The effectiveness of networks depends on critical components such as clients, servers, routers, and switches. Modems connect devices to the internet, while network interfaces enable devices to join a network. These elements, together with wired and wireless media, make data transmission feasible across distances.
For example, a modem connects a home router to an internet service provider (ISP), enabling users to access the internet and local network resources.
Networks rely on transmission media for data transfer. Wired media (e.g., Ethernet and fiber-optic cables) provide high-speed, reliable connections, while wireless media (e.g., Wi-Fi and cellular networks) enable mobility. Each medium has specific advantages depending on the application.
For instance, fiber-optic cables support high-speed internet in metropolitan areas, while Wi-Fi enables device connectivity within homes and offices without physical cabling.
Protocols define communication standards for data exchange across networks. TCP/IP is foundational for the internet, while HTTP supports web browsing. Protocols like FTP and SMTP enable file transfers and email communication, respectively.
For example, TCP/IP underpins internet connections, ensuring data packets are transmitted between devices without data loss, even over long distances.
With reference to Source A, identify two types of computing networks and describe one specific application for each.
With reference to Source B, explain the roles of a modem and a network interface in enabling network connectivity.
With reference to Source C, outline one advantage of using wired media and one advantage of using wireless media in networks.
With reference to Source D, describe the function of the TCP/IP protocol in network communication.
With reference to Sources A–D and your own knowledge, discuss how network types, components, and protocols facilitate efficient data communication across different environments. Provide examples to support your answer.
To what extent are employers responsible and accountable for employees’ health issues caused by the use of computers in the workplace, and when working from home?