Practice 3.3 Computers with authentic IB Digital Society (DS) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like systems and structures, human behavior and interaction, and digital technologies in society. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
Cloud networks allow for data storage and access over the internet, making data accessible from anywhere. This accessibility supports remote work, file sharing, and collaboration but also raises concerns about data security and control over personal information.
Evaluate the impact of cloud networks on data accessibility, considering the benefits for remote work and the potential security risks.
The UN secretary-general has called for states to conclude a new international treaty by 2026 to prohibit weapons systems without human control or oversight and that cannot be used in compliance with international humanitarian law. The treaty should regulate all types of autonomous weapons systems. The report reflects 58 submissions from over 73 countries and 33 submissions from the International Committee of the Red Cross and civil society groups. The UN General Assembly is considered a venue for inclusive discussions on autonomous weapons systems, considering international peace and security concerns.
On 27 March 2020, the Prime Minister of Libya, Faiez Serraj, announced the commencement of Operation PEACE STORM, which moved GNA-AF to the offensive along the coastal littoral. The combination of the Gabya-class frigates and Korkut short-range air defence systems provided a capability to place a mobile air defence bubble around GNA-AF ground units, which took Hafter Affiliated Forces (HAF) air assets out of the military equation. Libya classifies HAF as a terrorist rebel organization. The enhanced operational intelligence capability included Turkish-operated signal intelligence and the intelligence, surveillance and reconnaissance provided by Bayraktar TB-2 and probably TAI Anka S unmanned combat aerial vehicles. This allowed for the development of an asymmetrical war of attrition designed to degrade HAF ground unit capability. The GNA-AF breakout of Tripoli was supported with Firtina T155 155 mm self-propelled guns and T-122 Sakarya multi-launch rocket systems firing extended range precision munitions against the mid-twentieth century main battle tanks and heavy artillery used by HAF.
Logistics convoys and retreating HAF were subsequently hunted down and remotely engaged by the unmanned combat aerial vehicles or the lethal autonomous weapons systems such as the STM Kargu-2 (see annex 30) and other loitering munitions. The lethal autonomous weapons systems were programmed to attack targets without requiring data connectivity between the operator and the munition: in effect, a true ‘fire, forget and find’ capability. The unmanned combat aerial vehicles and the small drone intelligence, surveillance and reconnaissance capability of HAF were neutralized by electronic jamming from the Koral electronic warfare system.
In the autumn of 2001, however, the United States was unwilling to launch a full-scale land invasion in a region 7000 miles from home. Instead, a plan evolved to send into Afghanistan a small number of CIA agents and Special Forces in support of anti-Taliban militias, with the aid of the US Air Force. That first October night was a powerful display of coordination involving laser- guided munitions dropped from the air and Tomahawk cruise missiles launched from the sea. General Tommy Franks, who then led the US Central Command (CENTCOM), the military command overseeing operations in Afghanistan, wrote in his memoir American Soldier that the assault involved in total some 40,000 personnel, 393 aircraft, and 32 ships. But one aircraft did not feature at all in the Air Force’s complex planning: a tiny, CIA-controlled, propeller-driven spy drone, Predator tailfin number 3034 which had crept into Afghanistan some hours earlier. It now hangs suspended in the Smithsonian Air and Space Museum in Washington, D.C., its place in history assured. Yet its actions that first night of the war – in which numerous agencies in the vast US military-intelligence machine each played sharply contradictory roles – remain steeped in controversy.
Human Rights Watch released a report stating that representatives from around 50 countries will meet in the summer of 2021 at the UN to discuss worldwide policy alignment on ‘killer robots’ or ‘lethal autonomous weapons systems’. In their report, Human Rights Watch expressed objections to delegating lethal force to machines without the presence of meaningful human control. Bonnie Docherty, senior arms research at Human Rights Watch said: ‘The fundamental moral, legal and security concerns raised by autonomous weapons systems warrant a strong and urgent response in the form of a new international treaty ... International law needs to be expanded to create new rules that ensure human control and accountability in the use of force.’ Human Rights Watch proposes a treaty that covers the use of all weapons that operate autonomously that includes limitations and restrictions such as banning the use of killer robots, with many claims reinforcing that meaningful human control must be involved in the selection and engagement of targets. It goes on to define the scope and prevalence of ‘meaningful human control’ to ensure that humans have access to the data, risks and potential impacts prior to authorizing an attack.
With reference to Source A, identify two different or unexpected impacts of ‘killer robots’.
With reference to Source D, explain why it may be difficult to reach global agreement on ‘killer robot’ policy.
Compare and contrast how Sources B and C present their messages of events involving unmanned combat aerial vehicles events.
With reference to the sources and your own knowledge, evaluate the decision to ban automated military technology.
The role of portable digital devices in health
Jaime is an athlete and uses his sports watch to monitor his training sessions. He also uses it to keep a record of his health and well-being. The sports watch can monitor Jaime’s vital signs. It is also global positioning systems (GPS) enabled, so it can track his location (see Figure 4).
Figure 4: Data collected by a sports watch

The information that is recorded by Jaime’s sports watch is synchronized with a mobile application (app) installed on his cellphone/mobile phone.
Identify two vital signs that can be recorded by Jaime’s sports watch.
Identify the steps that the GPS receiver in Jaime’s sports watch uses to show the routes of his training runs.
Jaime has decided to share his personal health information with researchers at the University of Sierra Nevada.
Analyse Jaime’s decision to share his personal health information with the University of Sierra Nevada.
The development of mobile health apps has changed the way citizens manage their own health and well-being.
Discuss whether citizens like Jaime should rely only on the advice of a health app to manage their own health and well-being.
Source A
Source B (Remote Schools Learning Foundation article promoting SolarLearn)
SolarLearn was introduced in remote schools where electricity and internet connectivity are unreliable. Each student receives a rugged tablet designed for offline use, while teachers use a “ClassHub” mini-server to distribute lessons, collect assignments, and manage updates. SolarLearn’s supplier argues that learning improves when students have a consistent computing device with a stable interface and built-in accessibility options (text-to-speech, larger fonts). The tablets can run a coding sandbox, but the system restricts installations to an approved app list to reduce malware risk and keep storage predictable. The education ministry says the kit reduces textbook costs and makes it easier to track progress across schools. However, maintenance requires spare batteries and replacement screens, and some schools report delays in getting repairs.
Source C (same as above)
Average uptime during school hours: 96%, but in the wet season battery failures reduce uptime to 84% in the most remote cluster.
Teacher time spent photocopying fell by 53% after rollout; time spent troubleshooting devices rose by 34%.
17% of tablets reached “low storage” status within six months, correlated with repeated failed updates and slower app loading.
Accessibility tools were activated by 29% of students at least once per week; teachers report improved participation for students with reading difficulties.
A pilot comparison found quiz completion rates rose, but long-form writing scores showed minimal change in the first year.
Source D (newspaper article sponsored by large oil company excerpt)
SolarLearn is often described as “giving every child a computer,” but the question is what kind of computing is being provided. Locked-down tablets can become consumption-first devices: excellent for viewing lessons, weaker for open-ended creation, repair, and experimentation. When schools cannot install tools freely, “learning computing” may shrink into “using apps.” The ministry highlights progress tracking, yet that framing treats education as measurable outputs rather than messy human development. There is also a hidden hardware politics: batteries, screens, and storage limits become educational constraints, and remote schools pay the price when repairs are slow. A computer is not only a box of components; it is a socio-technical arrangement of devices, software permissions, training, and support. If the kit expands access, it must also avoid turning students into passive users of a predefined interface.
Define the term operating system using Source A.
Distinguish between hardware limitations and software restrictions in SolarLearn, with reference to Source B.
Compare and contrast what Source C and Source D suggest about whether SolarLearn meaningfully expands students’ computing capabilities.
Evaluate whether SolarLearn should be considered a successful deployment of computers in education. Answer this with reference to all the sources (A–D) and your own knowledge of the Digital Society course. Consider the relationship between hardware, software, and interfaces and the long-term sustainability of providing ubiquitous computing devices.
Firewalls are critical for network security, acting as barriers between internal networks and external threats. They control incoming and outgoing traffic, protecting against unauthorized access and cyber attacks. However, configuring firewalls effectively can be challenging, especially in large organizations.
Evaluate the role of firewalls in securing organizational networks, considering their effectiveness and potential challenges in implementation.
Malicious software (malware) is a significant threat to users of personal devices, as it can steal sensitive information, disrupt services, or even cause financial losses. With increased connectivity, devices are more vulnerable to these attacks, raising ethical questions about responsibility in cybersecurity.
Evaluate the ethical responsibilities of software developers and users in preventing the spread of malicious software on personal devices.
Moore’s Law has driven rapid advancements in technology by predicting that the number of transistors on a chip doubles approximately every two years. This trend has influenced the affordability, size, and power of devices like smartphones and laptops, though some predict Moore’s Law may be slowing down.
Discuss the significance of Moore’s Law in shaping the development of personal computing devices, including potential consequences if the law’s trend no longer holds true.
Online learning
TailorEd is a free online learning system that personalizes students’ learning by providing teachers with data about how students are progressing in their courses. Students create a personal profile and work through the assignments at their own pace. Teachers can log in to the learning system to see how the students are progressing. However, concerns have been expressed about the amount of data that is being collected.
The school has found that when students access the course platform, some content is being blocked. The network administrator has been asked to investigate the situation. Teachers believe that it would be more appropriate to train the students to use the platform responsibly, rather than use technology to block their access to certain websites.
Identify two ways how the TailorEd system could provide feedback to students.
Identify two ways how the data collected about students’ academic progress could be used by TailorEd.
Outline how a firewall functions.
There are two possible methods for ensuring students use the TailorEd online learning system responsibly. They are:
Analyse these two methods.
To what extent do the benefits of collecting students’ academic progress data outweigh the concerns of the students, teachers and parents?
Can digital technologies be used sustainably?
Many organizations claim that the most efficient use of information technology (IT) equipment, such as laptops and printers, is to replace them on a regular basis. For example, an organization’s strategy may be to do this every three years.
Other organizations purchase IT equipment that can easily be upgraded by increasing the storage and memory or upgrading the processing capabilities only when required. They claim they do not need to replace their IT equipment on such a regular basis and believe this is a more sustainable practice.
Evaluate the sustainability of these two strategies.
User interfaces (UI) are critical in making devices accessible to a diverse range of users. For example, voice-activated interfaces, like those on smartphones, allow individuals with limited mobility to use devices effectively. While these interfaces promote inclusivity, there are challenges, such as accuracy and user privacy, that can affect their effectiveness.
Evaluate the effectiveness of user interfaces, such as voice and graphic interfaces, in promoting accessibility in computing, considering both the benefits for users with disabilities and the associated technical challenges.