Practice 3.4 Networks and the internet with authentic IB Digital Society (DS) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like systems and structures, human behavior and interaction, and digital technologies in society. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
Cloud networks allow for data storage and access over the internet, making data accessible from anywhere. This accessibility supports remote work, file sharing, and collaboration but also raises concerns about data security and control over personal information.
Evaluate the impact of cloud networks on data accessibility, considering the benefits for remote work and the potential security risks.
Firewalls are critical for network security, acting as barriers between internal networks and external threats. They control incoming and outgoing traffic, protecting against unauthorized access and cyber attacks. However, configuring firewalls effectively can be challenging, especially in large organizations.
Evaluate the role of firewalls in securing organizational networks, considering their effectiveness and potential challenges in implementation.
Malicious software (malware) is a significant threat to users of personal devices, as it can steal sensitive information, disrupt services, or even cause financial losses. With increased connectivity, devices are more vulnerable to these attacks, raising ethical questions about responsibility in cybersecurity.
Evaluate the ethical responsibilities of software developers and users in preventing the spread of malicious software on personal devices.
In healthcare, algorithms are employed for predictive diagnostics by analyzing patient data to predict diseases or suggest treatments. While these algorithms can increase efficiency, a lack of transparency and accountability in cases of misdiagnosis or bias raises ethical concerns.
Evaluate the ethical implications of relying on algorithms for health diagnoses, particularly in terms of transparency and accountability for patient outcomes.
To what extent should users rely on the results of online mental health screening tools, such as online depression screening tests, and the result of web searches on health symptoms?
On 23 December 2011, an e-card with the subject ‘Merry Christmas!’ was supposedly sent by the US President’s office (from ‘jeff.jones@whitehouse.org’) to a massive number of recipients. Recipients who clicked to download and open the card (a .zip file) saw an animated Christmas tree while a trojan virus accessed their saved documents and passwords, and uploaded them to a server in Belarus.
Outline four steps in the process of how victims opening the e-card resulted in their files being uploaded to servers in Belarus.
In response to the news about the e-card trojan virus, some employees decided to search for, download and install FREE email protection software for their work computers instead of waiting for instructions from their employer. Evaluate this decision.
Computing networks enable connectivity across different scales and purposes, from Local Area Networks (LANs) within buildings to Wide Area Networks (WANs) spanning cities. Virtual Private Networks (VPNs) enhance security, while Client-Server and Peer-to-Peer (P2P) architectures support various communication methods.
For instance, a VPN can secure remote employee access to a company’s intranet, and LANs connect devices within a corporate office to share resources efficiently.
The effectiveness of networks depends on critical components such as clients, servers, routers, and switches. Modems connect devices to the internet, while network interfaces enable devices to join a network. These elements, together with wired and wireless media, make data transmission feasible across distances.
For example, a modem connects a home router to an internet service provider (ISP), enabling users to access the internet and local network resources.
Networks rely on transmission media for data transfer. Wired media (e.g., Ethernet and fiber-optic cables) provide high-speed, reliable connections, while wireless media (e.g., Wi-Fi and cellular networks) enable mobility. Each medium has specific advantages depending on the application.
For instance, fiber-optic cables support high-speed internet in metropolitan areas, while Wi-Fi enables device connectivity within homes and offices without physical cabling.
Protocols define communication standards for data exchange across networks. TCP/IP is foundational for the internet, while HTTP supports web browsing. Protocols like FTP and SMTP enable file transfers and email communication, respectively.
For example, TCP/IP underpins internet connections, ensuring data packets are transmitted between devices without data loss, even over long distances.
With reference to Source A, identify two types of computing networks and describe one specific application for each.
With reference to Source B, explain the roles of a modem and a network interface in enabling network connectivity.
With reference to Source C, outline one advantage of using wired media and one advantage of using wireless media in networks.
With reference to Source D, describe the function of the TCP/IP protocol in network communication.
With reference to Sources A–D and your own knowledge, discuss how network types, components, and protocols facilitate efficient data communication across different environments. Provide examples to support your answer.
To what extent are employers responsible and accountable for employees’ health issues caused by the use of computers in the workplace, and when working from home?
Virtual Private Networks (VPNs) have become essential for secure remote work, allowing employees to access company networks over the internet safely. While VPNs offer privacy and data security, they can also slow down connection speeds, impacting productivity.
To what extent should organizations rely on VPNs to secure remote work, considering both the security benefits and potential limitations in performance?
Digital currency
Bitcoin is a type of digital currency (cryptocurrency). This is money that can be sent via the internet and exchanged for goods, services, or money in different currencies. Users can buy bitcoins using real money, and bitcoins can either be spent or stored in a digital wallet for later use. Bitcoins can be used in every country, and sending bitcoins is as simple as sending an email.
A bitcoin wallet is an application that can be installed on a computer or mobile device. Once a bitcoin wallet is installed, the user will get a bitcoin address to use when transferring bitcoins to and from the wallet. This transfer uses private and public key encryption. Users should have a strong password to access their bitcoin wallet.
Bitcoin operates on a peer-to-peer (P2P) network, and users of bitcoins are identified by their bitcoin address. Some users of bitcoins wish to remain anonymous, but this is not always possible.
Identify two characteristics of a peer-to-peer (P2P) network.
Identify two characteristics of a strong password.
The use of a password is one method of authentication.
Identify two other methods of authentication.
Explain one reason why bitcoin makes use of encryption when transmitting data.
Explain one reason why it may be difficult to ensure the security of information in a large peer-to-peer network such as bitcoin.
Some users of bitcoins are concerned that their anonymity may be compromised by their bitcoin address.
Explain one way in which a bitcoin address may be used to reveal information about a bitcoin user.
Bitcoin transactions are made between individuals without the knowledge of banks, governments, or credit card companies. Some governments are investigating whether they should regulate digital transactions, such as those made using bitcoins.
To what extent is it appropriate for governments to regulate digital transactions, such as those made using bitcoins?