Practice 4.3 Environmental with authentic IB Digital Society (DS) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like systems and structures, human behavior and interaction, and digital technologies in society. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
Define the term ‘autonomous vehicle’.
Identify and explain the function of 2 sensors on an autonomous vehicle
Explain how sensors would be used by autonomous vehicles to avoid obstacles in the road.
Wildfire modelling
The fire control centre in the Kinakora National Park in New Zealand often has to cope with the natural phenomenon of wildfires. Staff have been collecting data about wildfires since 1970.
The size of each wildfire is measured, and the vegetation types affected are recorded. Data on the weather conditions is collected from sensors in the park. The staff at the fire control centre use this information to fight the wildfire.
A new computer modelling system is being developed using data collected from previous wildfires. This new system will improve the quality of the information available when fighting future wildfires.
The new system will also enable staff at Kinakora National Park to send information to tourists in the park to warn them when they are in danger from a wildfire.
Identify two measurements that could be taken by the weather sensors in Kinakora National Park.
Identify two methods that could be used to train the staff to use the new computer modelling system.
Identify two methods of visualization that could be used to present information from the new computer modelling system.
Two methods for informing tourists about wildfires in Kinakora National Park are:
Analyse these two methods.
Evaluate Kinakora National Park’s decision to use computer modelling to develop strategies for dealing with wildfires.
Can digital technologies be used sustainably?
Many organizations claim that the most efficient use of information technology (IT) equipment, such as laptops and printers, is to replace them on a regular basis. For example, an organization’s strategy may be to do this every three years.
Other organizations purchase IT equipment that can easily be upgraded by increasing the storage and memory or upgrading the processing capabilities only when required. They claim they do not need to replace their IT equipment on such a regular basis and believe this is a more sustainable practice.
Evaluate the sustainability of these two strategies.
Using a Segway with machine learning capabilities?
The Segway Patroller is a two-wheeled, battery-powered electric vehicle. Recently, Segway Patrollers have been used for security purposes in cities as well as in public spaces such as concerts, railway stations and shopping malls.
The Segway Patroller can travel up to a speed of 20 kilometres per hour (about 12 miles per hour) and travel about 40 kilometres (25 miles) in distance before the battery needs to be recharged.
Figure 3: A Segway Patroller

Each Segway Patroller can be customized by adding the following features.
The managers at Oliverstadt Station claim the introduction of upgraded Segways that have a GPS navigation system and machine learning capabilities would lead to improvements in the customer service provided.
Discuss whether the Segway Patrollers at Oliverstadt Station should be upgraded to include machine learning capabilities.
Artificial intelligence (AI) predicts earthquakes
Scientists at universities are developing a machine learning system to detect the warning signs that an earthquake is likely to occur. Using pattern-recognition algorithms similar to those in image and speech recognition, the system would be able to predict earthquakes a few days before they occur. Using machine learning, researchers will be able to run earthquake analysis 500 times faster than they could previously.
It is also possible to use machine learning to predict where the aftershocks* of an earthquake may occur (see Figure 4).
Figure 4: Prediction of aftershocks using machine learning

* aftershock: a smaller earthquake that follows a large earthquake
Outline one reason why it might be difficult to collect accurate data that can be used for predicting earthquakes.
Identify two characteristics of pattern recognition.
Identify two characteristics of an algorithm.
Scientists used visualizations, such as in Figure 4, to present the information about predicted earthquake activity.
Analyse the decision to use visualizations.
Discuss the advantages and disadvantages of using machine learning to predict natural disasters like earthquakes.
Digital currency
Bitcoin is a type of digital currency (cryptocurrency). This is money that can be sent via the internet and exchanged for goods, services, or money in different currencies. Users can buy bitcoins using real money, and bitcoins can either be spent or stored in a digital wallet for later use. Bitcoins can be used in every country, and sending bitcoins is as simple as sending an email.
A bitcoin wallet is an application that can be installed on a computer or mobile device. Once a bitcoin wallet is installed, the user will get a bitcoin address to use when transferring bitcoins to and from the wallet. This transfer uses private and public key encryption. Users should have a strong password to access their bitcoin wallet.
Bitcoin operates on a peer-to-peer (P2P) network, and users of bitcoins are identified by their bitcoin address. Some users of bitcoins wish to remain anonymous, but this is not always possible.
Identify two characteristics of a peer-to-peer (P2P) network.
Identify two characteristics of a strong password.
The use of a password is one method of authentication.
Identify two other methods of authentication.
Explain one reason why bitcoin makes use of encryption when transmitting data.
Explain one reason why it may be difficult to ensure the security of information in a large peer-to-peer network such as bitcoin.
Some users of bitcoins are concerned that their anonymity may be compromised by their bitcoin address.
Explain one way in which a bitcoin address may be used to reveal information about a bitcoin user.
Bitcoin transactions are made between individuals without the knowledge of banks, governments, or credit card companies. Some governments are investigating whether they should regulate digital transactions, such as those made using bitcoins.
To what extent is it appropriate for governments to regulate digital transactions, such as those made using bitcoins?
The integration of autonomous vehicles (AVs) has the potential to transform urban infrastructure by reducing traffic congestion, improving road safety, and optimizing parking. However, AVs also require infrastructure modifications, and their presence raises questions about road-sharing laws, pedestrian safety, and ethical decision-making in complex traffic situations.
Evaluate the extent to which autonomous vehicles should influence the redesign of urban infrastructure, considering both the potential benefits for traffic efficiency and the challenges of ensuring public safety.
Discuss how citizens could be impacted through the use of smart city digital technologies
Source A
Source B Through this article today, we are here to share with you the various challenges in the internet of things. Security challenges- The first and foremost on the list of challenges is security. As the backbone of IoT is data storage and sharing, the biggest question arises about the security of data. Enabling every small physical object with the feature of sharing information may attract multiple raised brows. Lack of encryption- Encryption sounds like the ultimate answer to security issues. But hackers may manipulate these algorithms and turn a protective system into the most serious loophole. Lack of sufficient testing and updating- With the increasing market of IoT, production has to be faster. To compete in the race of production, manufacturers lack tests and updates. The main focus of IoT manufacturers now seems to be production, not security. Thus products lack proper and regular testing and updates. This makes IOTs prone to being attacked by hackers.
Source C A smart home is a household with internet-connected appliances you can remotely control using a tablet or smartphone. It uses smart devices such as smart TVs, smart thermostats, air conditioners, and even a robot vacuum. They are then connected together in a single network, through either hardwired or wireless systems like Zigbee, Wi-Fi, Bluetooth, and NFC, among others. Using the Internet of Things (IoT) technology, your smart appliances can communicate and share real time data with each other. This allows the devices to perform scheduled and automated tasks. IoT home gadgets bounce data back and forth with the use of sensors, learning and processing your patterns to automatically adjust themselves to your comfort. Some smart home Internet of Things applications are automatic light switches, burglar alarms, and voice-activated sound systems.
Source D A tired business person returns to their certified IoT smart home after a long working week. The smart security system senses they are alone and initiates the “Friday Night In” sequence. An intercom with a thoughtful, comforting voice suggests they might want to order in tonight. The business person unloads their things in the kitchen where the smart stove displays a selection of take-outs, rather than its default recipe guide. After the food arrives they retreat to the living room to watch some TV. The smart TV prepares a selection of Netflix marathons categorized by mood. They choose: “Looking to be cheered up? Comedy Playlist.” Before starting the program, they review a set of graphs displaying the data from their activity and diet throughout the day. A list of tips for smart living is generated, one of which reads that based on the number of consecutive nights spent alone, they might consider exploring a selection of popular dating sites instead of watching TV. With an inadvertent slip of their thumb the request is OK’d and instantly a set of profiles are displayed, each chosen from a generated list of their tracked preferences. A flurry of pings and messages from other stay-at-home hopefuls fills the screen. The smart home intercom exclaims, “You’ve got mail!” The confused and beleaguered business person fumbles for the remote and… uh-oh, the TV snaps a selfie in response to the flood of pings. Their image, sitting in their underwear eating noodles appears briefly on the screen before being whisked off into the ether. The flood of messages doubles, the system freezes causing the smart home to reboot. The house goes dark.
With reference to Source A identify 2 positives of IoT.
With reference to Source B and one other real-world example you have studied, explain why it may be difficult to have IoT in smart homes.
Compare what Source C and Source D reveal about impacts of homeowners with IoT smart homes.
With reference to the sources and your own knowledge, discuss whether the use of IoT in smart homes is an incremental or transformational change.
Quantum computers encode in qubits instead of binary data. Where 8 bits in a computer can represent any number between 0 and 255, 8 qubits can represent those same numbers simultaneously. In research situations, quantum computers are able to examine a multitude of possible combinations and run a variety of simulations simultaneously.
To what extent will quantum computing impact research and development in academic environments?
Practice 4.3 Environmental with authentic IB Digital Society (DS) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like systems and structures, human behavior and interaction, and digital technologies in society. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
Define the term ‘autonomous vehicle’.
Identify and explain the function of 2 sensors on an autonomous vehicle
Explain how sensors would be used by autonomous vehicles to avoid obstacles in the road.
Wildfire modelling
The fire control centre in the Kinakora National Park in New Zealand often has to cope with the natural phenomenon of wildfires. Staff have been collecting data about wildfires since 1970.
The size of each wildfire is measured, and the vegetation types affected are recorded. Data on the weather conditions is collected from sensors in the park. The staff at the fire control centre use this information to fight the wildfire.
A new computer modelling system is being developed using data collected from previous wildfires. This new system will improve the quality of the information available when fighting future wildfires.
The new system will also enable staff at Kinakora National Park to send information to tourists in the park to warn them when they are in danger from a wildfire.
Identify two measurements that could be taken by the weather sensors in Kinakora National Park.
Identify two methods that could be used to train the staff to use the new computer modelling system.
Identify two methods of visualization that could be used to present information from the new computer modelling system.
Two methods for informing tourists about wildfires in Kinakora National Park are:
Analyse these two methods.
Evaluate Kinakora National Park’s decision to use computer modelling to develop strategies for dealing with wildfires.
Can digital technologies be used sustainably?
Many organizations claim that the most efficient use of information technology (IT) equipment, such as laptops and printers, is to replace them on a regular basis. For example, an organization’s strategy may be to do this every three years.
Other organizations purchase IT equipment that can easily be upgraded by increasing the storage and memory or upgrading the processing capabilities only when required. They claim they do not need to replace their IT equipment on such a regular basis and believe this is a more sustainable practice.
Evaluate the sustainability of these two strategies.
Using a Segway with machine learning capabilities?
The Segway Patroller is a two-wheeled, battery-powered electric vehicle. Recently, Segway Patrollers have been used for security purposes in cities as well as in public spaces such as concerts, railway stations and shopping malls.
The Segway Patroller can travel up to a speed of 20 kilometres per hour (about 12 miles per hour) and travel about 40 kilometres (25 miles) in distance before the battery needs to be recharged.
Figure 3: A Segway Patroller

Each Segway Patroller can be customized by adding the following features.
The managers at Oliverstadt Station claim the introduction of upgraded Segways that have a GPS navigation system and machine learning capabilities would lead to improvements in the customer service provided.
Discuss whether the Segway Patrollers at Oliverstadt Station should be upgraded to include machine learning capabilities.
Artificial intelligence (AI) predicts earthquakes
Scientists at universities are developing a machine learning system to detect the warning signs that an earthquake is likely to occur. Using pattern-recognition algorithms similar to those in image and speech recognition, the system would be able to predict earthquakes a few days before they occur. Using machine learning, researchers will be able to run earthquake analysis 500 times faster than they could previously.
It is also possible to use machine learning to predict where the aftershocks* of an earthquake may occur (see Figure 4).
Figure 4: Prediction of aftershocks using machine learning

* aftershock: a smaller earthquake that follows a large earthquake
Outline one reason why it might be difficult to collect accurate data that can be used for predicting earthquakes.
Identify two characteristics of pattern recognition.
Identify two characteristics of an algorithm.
Scientists used visualizations, such as in Figure 4, to present the information about predicted earthquake activity.
Analyse the decision to use visualizations.
Discuss the advantages and disadvantages of using machine learning to predict natural disasters like earthquakes.
Digital currency
Bitcoin is a type of digital currency (cryptocurrency). This is money that can be sent via the internet and exchanged for goods, services, or money in different currencies. Users can buy bitcoins using real money, and bitcoins can either be spent or stored in a digital wallet for later use. Bitcoins can be used in every country, and sending bitcoins is as simple as sending an email.
A bitcoin wallet is an application that can be installed on a computer or mobile device. Once a bitcoin wallet is installed, the user will get a bitcoin address to use when transferring bitcoins to and from the wallet. This transfer uses private and public key encryption. Users should have a strong password to access their bitcoin wallet.
Bitcoin operates on a peer-to-peer (P2P) network, and users of bitcoins are identified by their bitcoin address. Some users of bitcoins wish to remain anonymous, but this is not always possible.
Identify two characteristics of a peer-to-peer (P2P) network.
Identify two characteristics of a strong password.
The use of a password is one method of authentication.
Identify two other methods of authentication.
Explain one reason why bitcoin makes use of encryption when transmitting data.
Explain one reason why it may be difficult to ensure the security of information in a large peer-to-peer network such as bitcoin.
Some users of bitcoins are concerned that their anonymity may be compromised by their bitcoin address.
Explain one way in which a bitcoin address may be used to reveal information about a bitcoin user.
Bitcoin transactions are made between individuals without the knowledge of banks, governments, or credit card companies. Some governments are investigating whether they should regulate digital transactions, such as those made using bitcoins.
To what extent is it appropriate for governments to regulate digital transactions, such as those made using bitcoins?
The integration of autonomous vehicles (AVs) has the potential to transform urban infrastructure by reducing traffic congestion, improving road safety, and optimizing parking. However, AVs also require infrastructure modifications, and their presence raises questions about road-sharing laws, pedestrian safety, and ethical decision-making in complex traffic situations.
Evaluate the extent to which autonomous vehicles should influence the redesign of urban infrastructure, considering both the potential benefits for traffic efficiency and the challenges of ensuring public safety.
Discuss how citizens could be impacted through the use of smart city digital technologies
Source A
Source B Through this article today, we are here to share with you the various challenges in the internet of things. Security challenges- The first and foremost on the list of challenges is security. As the backbone of IoT is data storage and sharing, the biggest question arises about the security of data. Enabling every small physical object with the feature of sharing information may attract multiple raised brows. Lack of encryption- Encryption sounds like the ultimate answer to security issues. But hackers may manipulate these algorithms and turn a protective system into the most serious loophole. Lack of sufficient testing and updating- With the increasing market of IoT, production has to be faster. To compete in the race of production, manufacturers lack tests and updates. The main focus of IoT manufacturers now seems to be production, not security. Thus products lack proper and regular testing and updates. This makes IOTs prone to being attacked by hackers.
Source C A smart home is a household with internet-connected appliances you can remotely control using a tablet or smartphone. It uses smart devices such as smart TVs, smart thermostats, air conditioners, and even a robot vacuum. They are then connected together in a single network, through either hardwired or wireless systems like Zigbee, Wi-Fi, Bluetooth, and NFC, among others. Using the Internet of Things (IoT) technology, your smart appliances can communicate and share real time data with each other. This allows the devices to perform scheduled and automated tasks. IoT home gadgets bounce data back and forth with the use of sensors, learning and processing your patterns to automatically adjust themselves to your comfort. Some smart home Internet of Things applications are automatic light switches, burglar alarms, and voice-activated sound systems.
Source D A tired business person returns to their certified IoT smart home after a long working week. The smart security system senses they are alone and initiates the “Friday Night In” sequence. An intercom with a thoughtful, comforting voice suggests they might want to order in tonight. The business person unloads their things in the kitchen where the smart stove displays a selection of take-outs, rather than its default recipe guide. After the food arrives they retreat to the living room to watch some TV. The smart TV prepares a selection of Netflix marathons categorized by mood. They choose: “Looking to be cheered up? Comedy Playlist.” Before starting the program, they review a set of graphs displaying the data from their activity and diet throughout the day. A list of tips for smart living is generated, one of which reads that based on the number of consecutive nights spent alone, they might consider exploring a selection of popular dating sites instead of watching TV. With an inadvertent slip of their thumb the request is OK’d and instantly a set of profiles are displayed, each chosen from a generated list of their tracked preferences. A flurry of pings and messages from other stay-at-home hopefuls fills the screen. The smart home intercom exclaims, “You’ve got mail!” The confused and beleaguered business person fumbles for the remote and… uh-oh, the TV snaps a selfie in response to the flood of pings. Their image, sitting in their underwear eating noodles appears briefly on the screen before being whisked off into the ether. The flood of messages doubles, the system freezes causing the smart home to reboot. The house goes dark.
With reference to Source A identify 2 positives of IoT.
With reference to Source B and one other real-world example you have studied, explain why it may be difficult to have IoT in smart homes.
Compare what Source C and Source D reveal about impacts of homeowners with IoT smart homes.
With reference to the sources and your own knowledge, discuss whether the use of IoT in smart homes is an incremental or transformational change.
Quantum computers encode in qubits instead of binary data. Where 8 bits in a computer can represent any number between 0 and 255, 8 qubits can represent those same numbers simultaneously. In research situations, quantum computers are able to examine a multitude of possible combinations and run a variety of simulations simultaneously.
To what extent will quantum computing impact research and development in academic environments?