Practice 3.4 Networks and the internet with authentic IB Digital Society (DS) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like systems and structures, human behavior and interaction, and digital technologies in society. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
Cloud networks allow for data storage and access over the internet, making data accessible from anywhere. This accessibility supports remote work, file sharing, and collaboration but also raises concerns about data security and control over personal information.
Evaluate the impact of cloud networks on data accessibility, considering the benefits for remote work and the potential security risks.
Source A
Source B (Remote Schools Learning Foundation article promoting SolarLearn)
SolarLearn was introduced in remote schools where electricity and internet connectivity are unreliable. Each student receives a rugged tablet designed for offline use, while teachers use a “ClassHub” mini-server to distribute lessons, collect assignments, and manage updates. SolarLearn’s supplier argues that learning improves when students have a consistent computing device with a stable interface and built-in accessibility options (text-to-speech, larger fonts). The tablets can run a coding sandbox, but the system restricts installations to an approved app list to reduce malware risk and keep storage predictable. The education ministry says the kit reduces textbook costs and makes it easier to track progress across schools. However, maintenance requires spare batteries and replacement screens, and some schools report delays in getting repairs.
Source C (same as above)
Average uptime during school hours: 96%, but in the wet season battery failures reduce uptime to 84% in the most remote cluster.
Teacher time spent photocopying fell by 53% after rollout; time spent troubleshooting devices rose by 34%.
17% of tablets reached “low storage” status within six months, correlated with repeated failed updates and slower app loading.
Accessibility tools were activated by 29% of students at least once per week; teachers report improved participation for students with reading difficulties.
A pilot comparison found quiz completion rates rose, but long-form writing scores showed minimal change in the first year.
Source D (newspaper article sponsored by large oil company excerpt)
SolarLearn is often described as “giving every child a computer,” but the question is what kind of computing is being provided. Locked-down tablets can become consumption-first devices: excellent for viewing lessons, weaker for open-ended creation, repair, and experimentation. When schools cannot install tools freely, “learning computing” may shrink into “using apps.” The ministry highlights progress tracking, yet that framing treats education as measurable outputs rather than messy human development. There is also a hidden hardware politics: batteries, screens, and storage limits become educational constraints, and remote schools pay the price when repairs are slow. A computer is not only a box of components; it is a socio-technical arrangement of devices, software permissions, training, and support. If the kit expands access, it must also avoid turning students into passive users of a predefined interface.
Define the term operating system using Source A.
Distinguish between hardware limitations and software restrictions in SolarLearn, with reference to Source B.
Compare and contrast what Source C and Source D suggest about whether SolarLearn meaningfully expands students’ computing capabilities.
Evaluate whether SolarLearn should be considered a successful deployment of computers in education. Answer this with reference to all the sources (A–D) and your own knowledge of the Digital Society course. Consider the relationship between hardware, software, and interfaces and the long-term sustainability of providing ubiquitous computing devices.
Wildfire modelling
The fire control centre in the Kinakora National Park in New Zealand often has to cope with the natural phenomenon of wildfires. Staff have been collecting data about wildfires since 1970.
The size of each wildfire is measured, and the vegetation types affected are recorded. Data on the weather conditions is collected from sensors in the park. The staff at the fire control centre use this information to fight the wildfire.
A new computer modelling system is being developed using data collected from previous wildfires. This new system will improve the quality of the information available when fighting future wildfires.
The new system will also enable staff at Kinakora National Park to send information to tourists in the park to warn them when they are in danger from a wildfire.
Identify two measurements that could be taken by the weather sensors in Kinakora National Park.
Identify two methods that could be used to train the staff to use the new computer modelling system.
Identify two methods of visualization that could be used to present information from the new computer modelling system.
Two methods for informing tourists about wildfires in Kinakora National Park are:
Analyse these two methods.
Evaluate Kinakora National Park’s decision to use computer modelling to develop strategies for dealing with wildfires.
Firewalls are critical for network security, acting as barriers between internal networks and external threats. They control incoming and outgoing traffic, protecting against unauthorized access and cyber attacks. However, configuring firewalls effectively can be challenging, especially in large organizations.
Evaluate the role of firewalls in securing organizational networks, considering their effectiveness and potential challenges in implementation.
Malicious software (malware) is a significant threat to users of personal devices, as it can steal sensitive information, disrupt services, or even cause financial losses. With increased connectivity, devices are more vulnerable to these attacks, raising ethical questions about responsibility in cybersecurity.
Evaluate the ethical responsibilities of software developers and users in preventing the spread of malicious software on personal devices.
Online learning
TailorEd is a free online learning system that personalizes students’ learning by providing teachers with data about how students are progressing in their courses. Students create a personal profile and work through the assignments at their own pace. Teachers can log in to the learning system to see how the students are progressing. However, concerns have been expressed about the amount of data that is being collected.
The school has found that when students access the course platform, some content is being blocked. The network administrator has been asked to investigate the situation. Teachers believe that it would be more appropriate to train the students to use the platform responsibly, rather than use technology to block their access to certain websites.
Identify two ways how the TailorEd system could provide feedback to students.
Identify two ways how the data collected about students’ academic progress could be used by TailorEd.
Outline how a firewall functions.
There are two possible methods for ensuring students use the TailorEd online learning system responsibly. They are:
Analyse these two methods.
To what extent do the benefits of collecting students’ academic progress data outweigh the concerns of the students, teachers and parents?
In healthcare, algorithms are employed for predictive diagnostics by analyzing patient data to predict diseases or suggest treatments. While these algorithms can increase efficiency, a lack of transparency and accountability in cases of misdiagnosis or bias raises ethical concerns.
Evaluate the ethical implications of relying on algorithms for health diagnoses, particularly in terms of transparency and accountability for patient outcomes.
To what extent should users rely on the results of online mental health screening tools, such as online depression screening tests, and the result of web searches on health symptoms?
Which of the following best describes the impact of digital platforms on cultural exchange in a digital society?
On 23 December 2011, an e-card with the subject ‘Merry Christmas!’ was supposedly sent by the US President’s office (from ‘jeff.jones@whitehouse.org’) to a massive number of recipients. Recipients who clicked to download and open the card (a .zip file) saw an animated Christmas tree while a trojan virus accessed their saved documents and passwords, and uploaded them to a server in Belarus.
Outline four steps in the process of how victims opening the e-card resulted in their files being uploaded to servers in Belarus.
In response to the news about the e-card trojan virus, some employees decided to search for, download and install FREE email protection software for their work computers instead of waiting for instructions from their employer. Evaluate this decision.
Practice 3.4 Networks and the internet with authentic IB Digital Society (DS) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like systems and structures, human behavior and interaction, and digital technologies in society. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
Cloud networks allow for data storage and access over the internet, making data accessible from anywhere. This accessibility supports remote work, file sharing, and collaboration but also raises concerns about data security and control over personal information.
Evaluate the impact of cloud networks on data accessibility, considering the benefits for remote work and the potential security risks.
Source A
Source B (Remote Schools Learning Foundation article promoting SolarLearn)
SolarLearn was introduced in remote schools where electricity and internet connectivity are unreliable. Each student receives a rugged tablet designed for offline use, while teachers use a “ClassHub” mini-server to distribute lessons, collect assignments, and manage updates. SolarLearn’s supplier argues that learning improves when students have a consistent computing device with a stable interface and built-in accessibility options (text-to-speech, larger fonts). The tablets can run a coding sandbox, but the system restricts installations to an approved app list to reduce malware risk and keep storage predictable. The education ministry says the kit reduces textbook costs and makes it easier to track progress across schools. However, maintenance requires spare batteries and replacement screens, and some schools report delays in getting repairs.
Source C (same as above)
Average uptime during school hours: 96%, but in the wet season battery failures reduce uptime to 84% in the most remote cluster.
Teacher time spent photocopying fell by 53% after rollout; time spent troubleshooting devices rose by 34%.
17% of tablets reached “low storage” status within six months, correlated with repeated failed updates and slower app loading.
Accessibility tools were activated by 29% of students at least once per week; teachers report improved participation for students with reading difficulties.
A pilot comparison found quiz completion rates rose, but long-form writing scores showed minimal change in the first year.
Source D (newspaper article sponsored by large oil company excerpt)
SolarLearn is often described as “giving every child a computer,” but the question is what kind of computing is being provided. Locked-down tablets can become consumption-first devices: excellent for viewing lessons, weaker for open-ended creation, repair, and experimentation. When schools cannot install tools freely, “learning computing” may shrink into “using apps.” The ministry highlights progress tracking, yet that framing treats education as measurable outputs rather than messy human development. There is also a hidden hardware politics: batteries, screens, and storage limits become educational constraints, and remote schools pay the price when repairs are slow. A computer is not only a box of components; it is a socio-technical arrangement of devices, software permissions, training, and support. If the kit expands access, it must also avoid turning students into passive users of a predefined interface.
Define the term operating system using Source A.
Distinguish between hardware limitations and software restrictions in SolarLearn, with reference to Source B.
Compare and contrast what Source C and Source D suggest about whether SolarLearn meaningfully expands students’ computing capabilities.
Evaluate whether SolarLearn should be considered a successful deployment of computers in education. Answer this with reference to all the sources (A–D) and your own knowledge of the Digital Society course. Consider the relationship between hardware, software, and interfaces and the long-term sustainability of providing ubiquitous computing devices.
Wildfire modelling
The fire control centre in the Kinakora National Park in New Zealand often has to cope with the natural phenomenon of wildfires. Staff have been collecting data about wildfires since 1970.
The size of each wildfire is measured, and the vegetation types affected are recorded. Data on the weather conditions is collected from sensors in the park. The staff at the fire control centre use this information to fight the wildfire.
A new computer modelling system is being developed using data collected from previous wildfires. This new system will improve the quality of the information available when fighting future wildfires.
The new system will also enable staff at Kinakora National Park to send information to tourists in the park to warn them when they are in danger from a wildfire.
Identify two measurements that could be taken by the weather sensors in Kinakora National Park.
Identify two methods that could be used to train the staff to use the new computer modelling system.
Identify two methods of visualization that could be used to present information from the new computer modelling system.
Two methods for informing tourists about wildfires in Kinakora National Park are:
Analyse these two methods.
Evaluate Kinakora National Park’s decision to use computer modelling to develop strategies for dealing with wildfires.
Firewalls are critical for network security, acting as barriers between internal networks and external threats. They control incoming and outgoing traffic, protecting against unauthorized access and cyber attacks. However, configuring firewalls effectively can be challenging, especially in large organizations.
Evaluate the role of firewalls in securing organizational networks, considering their effectiveness and potential challenges in implementation.
Malicious software (malware) is a significant threat to users of personal devices, as it can steal sensitive information, disrupt services, or even cause financial losses. With increased connectivity, devices are more vulnerable to these attacks, raising ethical questions about responsibility in cybersecurity.
Evaluate the ethical responsibilities of software developers and users in preventing the spread of malicious software on personal devices.
Online learning
TailorEd is a free online learning system that personalizes students’ learning by providing teachers with data about how students are progressing in their courses. Students create a personal profile and work through the assignments at their own pace. Teachers can log in to the learning system to see how the students are progressing. However, concerns have been expressed about the amount of data that is being collected.
The school has found that when students access the course platform, some content is being blocked. The network administrator has been asked to investigate the situation. Teachers believe that it would be more appropriate to train the students to use the platform responsibly, rather than use technology to block their access to certain websites.
Identify two ways how the TailorEd system could provide feedback to students.
Identify two ways how the data collected about students’ academic progress could be used by TailorEd.
Outline how a firewall functions.
There are two possible methods for ensuring students use the TailorEd online learning system responsibly. They are:
Analyse these two methods.
To what extent do the benefits of collecting students’ academic progress data outweigh the concerns of the students, teachers and parents?
In healthcare, algorithms are employed for predictive diagnostics by analyzing patient data to predict diseases or suggest treatments. While these algorithms can increase efficiency, a lack of transparency and accountability in cases of misdiagnosis or bias raises ethical concerns.
Evaluate the ethical implications of relying on algorithms for health diagnoses, particularly in terms of transparency and accountability for patient outcomes.
To what extent should users rely on the results of online mental health screening tools, such as online depression screening tests, and the result of web searches on health symptoms?
Which of the following best describes the impact of digital platforms on cultural exchange in a digital society?
On 23 December 2011, an e-card with the subject ‘Merry Christmas!’ was supposedly sent by the US President’s office (from ‘jeff.jones@whitehouse.org’) to a massive number of recipients. Recipients who clicked to download and open the card (a .zip file) saw an animated Christmas tree while a trojan virus accessed their saved documents and passwords, and uploaded them to a server in Belarus.
Outline four steps in the process of how victims opening the e-card resulted in their files being uploaded to servers in Belarus.
In response to the news about the e-card trojan virus, some employees decided to search for, download and install FREE email protection software for their work computers instead of waiting for instructions from their employer. Evaluate this decision.