Practice 4.4 Health with authentic IB Digital Society (DS) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like systems and structures, human behavior and interaction, and digital technologies in society. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
It is a paradox to brand a technological innovation as tainted goods by its very name. ‘Deepfake’ is a victim of its own capabilities. Negative connotations and recent incidents have pigeonholed this innovation in the taboo zone. The rise of deepfake technology has ushered in very interesting possibilities and challenges. This synthetic media, created through sophisticated artificial intelligence algorithms, has begun to infiltrate various sectors, raising intriguing questions about its potential impact on education and employability.
The dawn of deepfake technology introduces a realm of possibilities in education. Imagine medical students engaging in lifelike surgical simulations or language learners participating in authentic conversations. The potential for deepfake to revolutionise training scenarios is vast and could significantly enhance the educational experience. Beyond simulations, deepfake can transport students to historical events through realistic reenactments or facilitate virtual field trips, transcending the boundaries of traditional education. The immersive nature of deepfake content holds the promise of making learning more engaging and memorable.
However, while these potential abuses of the technology are real and concerning that doesn't mean we should turn a blind eye to the technology’s potential when using it responsibly, says Jaime Donally, a well-known immersive learning expert.
“Typically, when we're hearing about it, it's in terms of the negative – impersonation and giving false claims,” Donally says. “But really, the technology has the power of bringing people from history alive through old images that we have using AI.”
Donally, a former math teacher and instructional technologist, has written about how a type of deep fake technology called deep nostalgia technology that went viral in 2021 can allow students to form a stronger connection with the past and their personal family heritage. The technology, available on the MyHeritage app, allows images to uploaded that are then turned into short animations thanks to AI technology.
Here are some of the ways in which teachers can utilize deep fake technology in the classroom utilizing the MyHeritage app. Teachers have used the deep fake technology in the My Heritage app to bring historical figures such as Amelia Earhart and Albert Einstein to life. One teacher Donally has communicated with used an animation of Frederick Douglass (above) to help students connect with Douglass’ famous 1852 speech about the meaning of the Fourth of July to Black enslaved Americans. Another teacher has plans to use the app to have students interview a historical figure and create dialogue for them, then match the dialogue to the animation.
Donally herself has paired animations she's created with other types of immersive technology. “I layered it on top in augmented reality,” she says. “When you scan the photo of my grandfather, it all came to life. And it became something that was much more relevant to see in your real-world space.”
With proper supervision, students can use the technology to animate images of family members or local historical figures, and can experiment with augmented reality (AR) in the process. “It makes you want to learn more,” Donally says of animations created using deep fake technology. “It drives you into kind of the history and understanding a bit more, and I think it also helps you identify who you are in that process.”
Education platforms are harnessing deepfake technology to create AI tutors that provide customised support to students. Rather than a generic video lecture, each learner can get tailored instruction and feedback from a virtual tutor who speaks their language and adjusts to their level.
For example, Anthropic built Claude, an AI assistant designed specifically for education. Claude can answer students’ natural language questions, explain concepts clearly, and identify knowledge gaps.
Such AI tutors make learning more effective, accessible, and inclusive. Students feel like they have an expert guide helping them master new skills and material.
AI and deepfake technology have enormous potential to enhance workforce training and education in immersive new ways too. As Drew Rose, CSO and founder of cybersecurity firm Living Security, explains, “educators can leverage deepfakes to create immersive learning experiences. For instance, a history lesson might feature a ‘guest appearance’ by a historical figure, or a science lesson might have a renowned scientist explaining complex concepts.” Ivana Bartoletti, privacy and data protection expert at Wipro and author of An Artificial Revolution – On Power, Politics and AI envisions similar applications.
“Deepfake technologies could provide an easier and less expensive way to train and visualise,” she says. “Students of medicine and nursing currently train with animatronic robots. They are expensive and require special control rooms. Generative AI and augmented or virtual reality headsets or practice rooms will be cheaper and allow for the generalisation, if not the gamification, of simulation.”
Medical students could gain experience diagnosing and treating simulated patients, while business students could practice high-stakes scenarios like negotiations without real-world consequences. These immersive, gamified environments enabled by AI and deepfakes also have vast potential for corporate training.
Bartoletti notes, “A similar use case could be made for other types of learning that require risky and skill-based experiences. The Air Force uses AI as adversaries in flight simulators, and humans have not beaten the best AIs since 2015.
With reference to Source A identify 3 harmful uses of deep fakes.
With reference to Source B and one other real-world example you have studied, explain why deepfakes may be used for beneficial purposes in today's world
Compare what Source C and Source D reveal about the perspectives of deepfakes in the education sector.
With reference to the sources and your own knowledge, discuss whether the use of deepfakes in the educational sector is an incremental or transformational change.
The role of portable digital devices in health
Jaime is an athlete and uses his sports watch to monitor his training sessions. He also uses it to keep a record of his health and well-being. The sports watch can monitor Jaime’s vital signs. It is also global positioning systems (GPS) enabled, so it can track his location (see Figure 4).
Figure 4: Data collected by a sports watch

The information that is recorded by Jaime’s sports watch is synchronized with a mobile application (app) installed on his cellphone/mobile phone.
Identify two vital signs that can be recorded by Jaime’s sports watch.
Identify the steps that the GPS receiver in Jaime’s sports watch uses to show the routes of his training runs.
Jaime has decided to share his personal health information with researchers at the University of Sierra Nevada.
Analyse Jaime’s decision to share his personal health information with the University of Sierra Nevada.
The development of mobile health apps has changed the way citizens manage their own health and well-being.
Discuss whether citizens like Jaime should rely only on the advice of a health app to manage their own health and well-being.
In healthcare, algorithms are employed for predictive diagnostics by analyzing patient data to predict diseases or suggest treatments. While these algorithms can increase efficiency, a lack of transparency and accountability in cases of misdiagnosis or bias raises ethical concerns.
Evaluate the ethical implications of relying on algorithms for health diagnoses, particularly in terms of transparency and accountability for patient outcomes.
To what extent should users rely on the results of online mental health screening tools, such as online depression screening tests, and the result of web searches on health symptoms?
Data storage (like hard drives and SSDs) holds files permanently, while memory (RAM) stores temporary data, supporting the computer’s processing needs. Effective storage and memory are critical to speed and multitasking abilities in devices from smartphones to mainframes.
For example, an SSD in a laptop allows fast data retrieval, boosting performance for tasks like video editing and gaming.
Wearable computers, such as smartwatches and fitness trackers, integrate technology into daily life, providing health monitoring, communication, and real-time data tracking. These devices are lightweight and adaptable, making them practical for continuous use.
For instance, a smartwatch can monitor heart rate, track physical activity, and send alerts, helping users maintain their health goals.
Moore’s Law states that the number of transistors in a microchip doubles approximately every two years, boosting processing power. This principle has driven computing advancements, leading to smaller, faster, and more efficient devices.
For example, Moore’s Law facilitated the evolution from bulky desktop computers to powerful smartphones that fit in a pocket.
User interfaces (UIs) allow people to interact with computers. Graphical user interfaces (GUIs) use icons and visuals to make navigation intuitive, while haptic interfaces provide touch feedback, enhancing the tactile experience in applications like gaming and virtual reality.
For example, smartphones combine haptic feedback with touchscreens, making interactions more intuitive for users.
With reference to Source A, explain the difference between data storage and memory, including one example of each.
With reference to Source B, describe two ways wearable devices integrate technology into daily life.
With reference to Source C, outline the impact of Moore’s Law on the evolution of computing devices.
With reference to Source D, identify two types of user interfaces and describe their functions in enhancing user interaction.
With reference to Sources A–D and your own knowledge, discuss the implications of technological advancements in computing on user experience and lifestyle. Include examples of at least two advancements.
Voice simulation
Lyrebird voice-cloning software was created by three university students from Montreal. This technology was originally developed to change the lives of people who have lost their voice. These people can use the software to create a new voice by choosing one from samples provided in the software.
However, Lyrebird can also clone voices. Lyrebird claims that it can clone a person’s voice in just 60 seconds. Users only need to access the website, create an account, and generate a voice print by repeating a number of predetermined sentences. Although the cloning is not perfect, the developers of Lyrebird believe that both the time to clone the voice and the quality of the cloning will improve in the future.
The software allows the user to alter the speech and add emotion (such as, anger, elation, and surprise), increasing the ways in which it can be used.
The initial voice print for the cloning process requires the most time and a lot of processing power. However, creating speech from the voice print is a simple process, generating around 1000 sentences almost instantly. The voice print is saved as a compressed audio file.
Lyrebird has considered the ethical issues regarding biometrics* and acknowledges that it highlights some key societal issues. Lyrebird has taken the decision to make the software available to all in an attempt to address these issues.
* biometrics: a means of personal identification through analysis of unique physical traits or behavioural characteristics (for example, through voice patterns or fingerprints)
Lyrebird uses a person’s voice print to determine their identity.
Identify three other methods of biometric identification that could be used to determine a person’s identity.
A person’s voice print can be compressed.
Identify three problems that may result from compressing the voice print.
To what extent do the benefits of using Lyrebird’s voice-cloning software outweigh the concerns that may arise from its use?
Analysewhether it would be appropriate for Lyrebird to release the biometric data of a user to a third party.
Source A
Source B Through this article today, we are here to share with you the various challenges in the internet of things. Security challenges- The first and foremost on the list of challenges is security. As the backbone of IoT is data storage and sharing, the biggest question arises about the security of data. Enabling every small physical object with the feature of sharing information may attract multiple raised brows. Lack of encryption- Encryption sounds like the ultimate answer to security issues. But hackers may manipulate these algorithms and turn a protective system into the most serious loophole. Lack of sufficient testing and updating- With the increasing market of IoT, production has to be faster. To compete in the race of production, manufacturers lack tests and updates. The main focus of IoT manufacturers now seems to be production, not security. Thus products lack proper and regular testing and updates. This makes IOTs prone to being attacked by hackers.
Source C A smart home is a household with internet-connected appliances you can remotely control using a tablet or smartphone. It uses smart devices such as smart TVs, smart thermostats, air conditioners, and even a robot vacuum. They are then connected together in a single network, through either hardwired or wireless systems like Zigbee, Wi-Fi, Bluetooth, and NFC, among others. Using the Internet of Things (IoT) technology, your smart appliances can communicate and share real time data with each other. This allows the devices to perform scheduled and automated tasks. IoT home gadgets bounce data back and forth with the use of sensors, learning and processing your patterns to automatically adjust themselves to your comfort. Some smart home Internet of Things applications are automatic light switches, burglar alarms, and voice-activated sound systems.
Source D A tired business person returns to their certified IoT smart home after a long working week. The smart security system senses they are alone and initiates the “Friday Night In” sequence. An intercom with a thoughtful, comforting voice suggests they might want to order in tonight. The business person unloads their things in the kitchen where the smart stove displays a selection of take-outs, rather than its default recipe guide. After the food arrives they retreat to the living room to watch some TV. The smart TV prepares a selection of Netflix marathons categorized by mood. They choose: “Looking to be cheered up? Comedy Playlist.” Before starting the program, they review a set of graphs displaying the data from their activity and diet throughout the day. A list of tips for smart living is generated, one of which reads that based on the number of consecutive nights spent alone, they might consider exploring a selection of popular dating sites instead of watching TV. With an inadvertent slip of their thumb the request is OK’d and instantly a set of profiles are displayed, each chosen from a generated list of their tracked preferences. A flurry of pings and messages from other stay-at-home hopefuls fills the screen. The smart home intercom exclaims, “You’ve got mail!” The confused and beleaguered business person fumbles for the remote and… uh-oh, the TV snaps a selfie in response to the flood of pings. Their image, sitting in their underwear eating noodles appears briefly on the screen before being whisked off into the ether. The flood of messages doubles, the system freezes causing the smart home to reboot. The house goes dark.
With reference to Source A identify 2 positives of IoT.
With reference to Source B and one other real-world example you have studied, explain why it may be difficult to have IoT in smart homes.
Compare what Source C and Source D reveal about impacts of homeowners with IoT smart homes.
With reference to the sources and your own knowledge, discuss whether the use of IoT in smart homes is an incremental or transformational change.
RESOURCE BOOKLET: Implanted microchips
Source A: Graphic

**Source B: Series of message posts
**Posts from award-winning tech influencer and blogger @richtech

Source C: Article – Bans on microchipping employees
Many countries are passing laws that prohibit companies from requiring employees to have a device such as microchip or radio frequency identification device (RFID) tag implanted into their bodies as a condition of employment.
Employees can still be microchipped if they volunteer to do so. Tech4All, a technology company, has microchipped more than 50 of its employees. The company claims the microchips help people to open building doors, access their computers, and pay for items in the company restaurant.
It takes 40–60 days for the chip to settle under the skin. During this period, it can itch, and scratching is discouraged as it could dislodge the chip. The chips are relatively durable and will handle most bumps, but extreme pressure has been known to shatter them. The chips do not heat up or explode when anywhere near airport security scanners, but they may fail after a magnetic resonance imaging (MRI) scan.
Source D
Biohacking is the next stage in human evolution. Biohackers can optimize their bodies with a combination of gadgets, microchip implants, diets, or anything else they can put into their body to make it work better. The use of microchip implants is also an extension of the concept of the Internet of Things (IoT). By 2030, it is estimated that there will be more than 75 billion connected devices.
Microchips have been used in pets as form of identification to quickly reunite owners with lost or injured pets. Now, microchipping is being considered for the tracking of individuals like the elderly, those with memory loss, and prisoners.
Supporters of microchip implants say they are safe and can be protected from being hacked. However, there are privacy concerns about the data transmitted from or stored on the microchip. These concerns go beyond those associated with location tracking.
Automated medical image analysis
EBBZS IT, based in Groningen, the Netherlands, intends to develop a system using artificial intelligence (AI) to help doctors at Joelstraat Hospital interpret medical images.
Due to the high resolution* of the digital images (see Figure 4), EBBZS IT claims the AI system will be able to learn from these images to assist doctors when diagnosing patients’ illnesses.
EBBZS IT also claims the AI system will be able to cope with the significant increase in the volume of patients and the increased complexity of their symptoms and conditions.
Figure 4: Examples of digital images used in the AI system

* resolution: the detail an image holds. It can be measured in pixels per centimetre.
Discuss the claim by EBBZS IT that the diagnosis of patients’ illnesses should be based on the information provided by the AI system.
RESOURCE BOOKLET: Implanted microchips
Source A: Graphic

**Source B: Series of message posts
**Posts from award-winning tech influencer and blogger @richtech

Source C: Article – Bans on microchipping employees
Many countries are passing laws that prohibit companies from requiring employees to have a device such as microchip or radio frequency identification device (RFID) tag implanted into their bodies as a condition of employment.
Employees can still be microchipped if they volunteer to do so. Tech4All, a technology company, has microchipped more than 50 of its employees. The company claims the microchips help people to open building doors, access their computers, and pay for items in the company restaurant.
It takes 40–60 days for the chip to settle under the skin. During this period, it can itch, and scratching is discouraged as it could dislodge the chip. The chips are relatively durable and will handle most bumps, but extreme pressure has been known to shatter them. The chips do not heat up or explode when anywhere near airport security scanners, but they may fail after a magnetic resonance imaging (MRI) scan.
Source D
Biohacking is the next stage in human evolution. Biohackers can optimize their bodies with a combination of gadgets, microchip implants, diets, or anything else they can put into their body to make it work better. The use of microchip implants is also an extension of the concept of the Internet of Things (IoT). By 2030, it is estimated that there will be more than 75 billion connected devices.
Microchips have been used in pets as form of identification to quickly reunite owners with lost or injured pets. Now, microchipping is being considered for the tracking of individuals like the elderly, those with memory loss, and prisoners.
Supporters of microchip implants say they are safe and can be protected from being hacked. However, there are privacy concerns about the data transmitted from or stored on the microchip. These concerns go beyond those associated with location tracking.
Practice 4.4 Health with authentic IB Digital Society (DS) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like systems and structures, human behavior and interaction, and digital technologies in society. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
It is a paradox to brand a technological innovation as tainted goods by its very name. ‘Deepfake’ is a victim of its own capabilities. Negative connotations and recent incidents have pigeonholed this innovation in the taboo zone. The rise of deepfake technology has ushered in very interesting possibilities and challenges. This synthetic media, created through sophisticated artificial intelligence algorithms, has begun to infiltrate various sectors, raising intriguing questions about its potential impact on education and employability.
The dawn of deepfake technology introduces a realm of possibilities in education. Imagine medical students engaging in lifelike surgical simulations or language learners participating in authentic conversations. The potential for deepfake to revolutionise training scenarios is vast and could significantly enhance the educational experience. Beyond simulations, deepfake can transport students to historical events through realistic reenactments or facilitate virtual field trips, transcending the boundaries of traditional education. The immersive nature of deepfake content holds the promise of making learning more engaging and memorable.
However, while these potential abuses of the technology are real and concerning that doesn't mean we should turn a blind eye to the technology’s potential when using it responsibly, says Jaime Donally, a well-known immersive learning expert.
“Typically, when we're hearing about it, it's in terms of the negative – impersonation and giving false claims,” Donally says. “But really, the technology has the power of bringing people from history alive through old images that we have using AI.”
Donally, a former math teacher and instructional technologist, has written about how a type of deep fake technology called deep nostalgia technology that went viral in 2021 can allow students to form a stronger connection with the past and their personal family heritage. The technology, available on the MyHeritage app, allows images to uploaded that are then turned into short animations thanks to AI technology.
Here are some of the ways in which teachers can utilize deep fake technology in the classroom utilizing the MyHeritage app. Teachers have used the deep fake technology in the My Heritage app to bring historical figures such as Amelia Earhart and Albert Einstein to life. One teacher Donally has communicated with used an animation of Frederick Douglass (above) to help students connect with Douglass’ famous 1852 speech about the meaning of the Fourth of July to Black enslaved Americans. Another teacher has plans to use the app to have students interview a historical figure and create dialogue for them, then match the dialogue to the animation.
Donally herself has paired animations she's created with other types of immersive technology. “I layered it on top in augmented reality,” she says. “When you scan the photo of my grandfather, it all came to life. And it became something that was much more relevant to see in your real-world space.”
With proper supervision, students can use the technology to animate images of family members or local historical figures, and can experiment with augmented reality (AR) in the process. “It makes you want to learn more,” Donally says of animations created using deep fake technology. “It drives you into kind of the history and understanding a bit more, and I think it also helps you identify who you are in that process.”
Education platforms are harnessing deepfake technology to create AI tutors that provide customised support to students. Rather than a generic video lecture, each learner can get tailored instruction and feedback from a virtual tutor who speaks their language and adjusts to their level.
For example, Anthropic built Claude, an AI assistant designed specifically for education. Claude can answer students’ natural language questions, explain concepts clearly, and identify knowledge gaps.
Such AI tutors make learning more effective, accessible, and inclusive. Students feel like they have an expert guide helping them master new skills and material.
AI and deepfake technology have enormous potential to enhance workforce training and education in immersive new ways too. As Drew Rose, CSO and founder of cybersecurity firm Living Security, explains, “educators can leverage deepfakes to create immersive learning experiences. For instance, a history lesson might feature a ‘guest appearance’ by a historical figure, or a science lesson might have a renowned scientist explaining complex concepts.” Ivana Bartoletti, privacy and data protection expert at Wipro and author of An Artificial Revolution – On Power, Politics and AI envisions similar applications.
“Deepfake technologies could provide an easier and less expensive way to train and visualise,” she says. “Students of medicine and nursing currently train with animatronic robots. They are expensive and require special control rooms. Generative AI and augmented or virtual reality headsets or practice rooms will be cheaper and allow for the generalisation, if not the gamification, of simulation.”
Medical students could gain experience diagnosing and treating simulated patients, while business students could practice high-stakes scenarios like negotiations without real-world consequences. These immersive, gamified environments enabled by AI and deepfakes also have vast potential for corporate training.
Bartoletti notes, “A similar use case could be made for other types of learning that require risky and skill-based experiences. The Air Force uses AI as adversaries in flight simulators, and humans have not beaten the best AIs since 2015.
With reference to Source A identify 3 harmful uses of deep fakes.
With reference to Source B and one other real-world example you have studied, explain why deepfakes may be used for beneficial purposes in today's world
Compare what Source C and Source D reveal about the perspectives of deepfakes in the education sector.
With reference to the sources and your own knowledge, discuss whether the use of deepfakes in the educational sector is an incremental or transformational change.
The role of portable digital devices in health
Jaime is an athlete and uses his sports watch to monitor his training sessions. He also uses it to keep a record of his health and well-being. The sports watch can monitor Jaime’s vital signs. It is also global positioning systems (GPS) enabled, so it can track his location (see Figure 4).
Figure 4: Data collected by a sports watch

The information that is recorded by Jaime’s sports watch is synchronized with a mobile application (app) installed on his cellphone/mobile phone.
Identify two vital signs that can be recorded by Jaime’s sports watch.
Identify the steps that the GPS receiver in Jaime’s sports watch uses to show the routes of his training runs.
Jaime has decided to share his personal health information with researchers at the University of Sierra Nevada.
Analyse Jaime’s decision to share his personal health information with the University of Sierra Nevada.
The development of mobile health apps has changed the way citizens manage their own health and well-being.
Discuss whether citizens like Jaime should rely only on the advice of a health app to manage their own health and well-being.
In healthcare, algorithms are employed for predictive diagnostics by analyzing patient data to predict diseases or suggest treatments. While these algorithms can increase efficiency, a lack of transparency and accountability in cases of misdiagnosis or bias raises ethical concerns.
Evaluate the ethical implications of relying on algorithms for health diagnoses, particularly in terms of transparency and accountability for patient outcomes.
To what extent should users rely on the results of online mental health screening tools, such as online depression screening tests, and the result of web searches on health symptoms?
Data storage (like hard drives and SSDs) holds files permanently, while memory (RAM) stores temporary data, supporting the computer’s processing needs. Effective storage and memory are critical to speed and multitasking abilities in devices from smartphones to mainframes.
For example, an SSD in a laptop allows fast data retrieval, boosting performance for tasks like video editing and gaming.
Wearable computers, such as smartwatches and fitness trackers, integrate technology into daily life, providing health monitoring, communication, and real-time data tracking. These devices are lightweight and adaptable, making them practical for continuous use.
For instance, a smartwatch can monitor heart rate, track physical activity, and send alerts, helping users maintain their health goals.
Moore’s Law states that the number of transistors in a microchip doubles approximately every two years, boosting processing power. This principle has driven computing advancements, leading to smaller, faster, and more efficient devices.
For example, Moore’s Law facilitated the evolution from bulky desktop computers to powerful smartphones that fit in a pocket.
User interfaces (UIs) allow people to interact with computers. Graphical user interfaces (GUIs) use icons and visuals to make navigation intuitive, while haptic interfaces provide touch feedback, enhancing the tactile experience in applications like gaming and virtual reality.
For example, smartphones combine haptic feedback with touchscreens, making interactions more intuitive for users.
With reference to Source A, explain the difference between data storage and memory, including one example of each.
With reference to Source B, describe two ways wearable devices integrate technology into daily life.
With reference to Source C, outline the impact of Moore’s Law on the evolution of computing devices.
With reference to Source D, identify two types of user interfaces and describe their functions in enhancing user interaction.
With reference to Sources A–D and your own knowledge, discuss the implications of technological advancements in computing on user experience and lifestyle. Include examples of at least two advancements.
Voice simulation
Lyrebird voice-cloning software was created by three university students from Montreal. This technology was originally developed to change the lives of people who have lost their voice. These people can use the software to create a new voice by choosing one from samples provided in the software.
However, Lyrebird can also clone voices. Lyrebird claims that it can clone a person’s voice in just 60 seconds. Users only need to access the website, create an account, and generate a voice print by repeating a number of predetermined sentences. Although the cloning is not perfect, the developers of Lyrebird believe that both the time to clone the voice and the quality of the cloning will improve in the future.
The software allows the user to alter the speech and add emotion (such as, anger, elation, and surprise), increasing the ways in which it can be used.
The initial voice print for the cloning process requires the most time and a lot of processing power. However, creating speech from the voice print is a simple process, generating around 1000 sentences almost instantly. The voice print is saved as a compressed audio file.
Lyrebird has considered the ethical issues regarding biometrics* and acknowledges that it highlights some key societal issues. Lyrebird has taken the decision to make the software available to all in an attempt to address these issues.
* biometrics: a means of personal identification through analysis of unique physical traits or behavioural characteristics (for example, through voice patterns or fingerprints)
Lyrebird uses a person’s voice print to determine their identity.
Identify three other methods of biometric identification that could be used to determine a person’s identity.
A person’s voice print can be compressed.
Identify three problems that may result from compressing the voice print.
To what extent do the benefits of using Lyrebird’s voice-cloning software outweigh the concerns that may arise from its use?
Analysewhether it would be appropriate for Lyrebird to release the biometric data of a user to a third party.
Source A
Source B Through this article today, we are here to share with you the various challenges in the internet of things. Security challenges- The first and foremost on the list of challenges is security. As the backbone of IoT is data storage and sharing, the biggest question arises about the security of data. Enabling every small physical object with the feature of sharing information may attract multiple raised brows. Lack of encryption- Encryption sounds like the ultimate answer to security issues. But hackers may manipulate these algorithms and turn a protective system into the most serious loophole. Lack of sufficient testing and updating- With the increasing market of IoT, production has to be faster. To compete in the race of production, manufacturers lack tests and updates. The main focus of IoT manufacturers now seems to be production, not security. Thus products lack proper and regular testing and updates. This makes IOTs prone to being attacked by hackers.
Source C A smart home is a household with internet-connected appliances you can remotely control using a tablet or smartphone. It uses smart devices such as smart TVs, smart thermostats, air conditioners, and even a robot vacuum. They are then connected together in a single network, through either hardwired or wireless systems like Zigbee, Wi-Fi, Bluetooth, and NFC, among others. Using the Internet of Things (IoT) technology, your smart appliances can communicate and share real time data with each other. This allows the devices to perform scheduled and automated tasks. IoT home gadgets bounce data back and forth with the use of sensors, learning and processing your patterns to automatically adjust themselves to your comfort. Some smart home Internet of Things applications are automatic light switches, burglar alarms, and voice-activated sound systems.
Source D A tired business person returns to their certified IoT smart home after a long working week. The smart security system senses they are alone and initiates the “Friday Night In” sequence. An intercom with a thoughtful, comforting voice suggests they might want to order in tonight. The business person unloads their things in the kitchen where the smart stove displays a selection of take-outs, rather than its default recipe guide. After the food arrives they retreat to the living room to watch some TV. The smart TV prepares a selection of Netflix marathons categorized by mood. They choose: “Looking to be cheered up? Comedy Playlist.” Before starting the program, they review a set of graphs displaying the data from their activity and diet throughout the day. A list of tips for smart living is generated, one of which reads that based on the number of consecutive nights spent alone, they might consider exploring a selection of popular dating sites instead of watching TV. With an inadvertent slip of their thumb the request is OK’d and instantly a set of profiles are displayed, each chosen from a generated list of their tracked preferences. A flurry of pings and messages from other stay-at-home hopefuls fills the screen. The smart home intercom exclaims, “You’ve got mail!” The confused and beleaguered business person fumbles for the remote and… uh-oh, the TV snaps a selfie in response to the flood of pings. Their image, sitting in their underwear eating noodles appears briefly on the screen before being whisked off into the ether. The flood of messages doubles, the system freezes causing the smart home to reboot. The house goes dark.
With reference to Source A identify 2 positives of IoT.
With reference to Source B and one other real-world example you have studied, explain why it may be difficult to have IoT in smart homes.
Compare what Source C and Source D reveal about impacts of homeowners with IoT smart homes.
With reference to the sources and your own knowledge, discuss whether the use of IoT in smart homes is an incremental or transformational change.
RESOURCE BOOKLET: Implanted microchips
Source A: Graphic

**Source B: Series of message posts
**Posts from award-winning tech influencer and blogger @richtech

Source C: Article – Bans on microchipping employees
Many countries are passing laws that prohibit companies from requiring employees to have a device such as microchip or radio frequency identification device (RFID) tag implanted into their bodies as a condition of employment.
Employees can still be microchipped if they volunteer to do so. Tech4All, a technology company, has microchipped more than 50 of its employees. The company claims the microchips help people to open building doors, access their computers, and pay for items in the company restaurant.
It takes 40–60 days for the chip to settle under the skin. During this period, it can itch, and scratching is discouraged as it could dislodge the chip. The chips are relatively durable and will handle most bumps, but extreme pressure has been known to shatter them. The chips do not heat up or explode when anywhere near airport security scanners, but they may fail after a magnetic resonance imaging (MRI) scan.
Source D
Biohacking is the next stage in human evolution. Biohackers can optimize their bodies with a combination of gadgets, microchip implants, diets, or anything else they can put into their body to make it work better. The use of microchip implants is also an extension of the concept of the Internet of Things (IoT). By 2030, it is estimated that there will be more than 75 billion connected devices.
Microchips have been used in pets as form of identification to quickly reunite owners with lost or injured pets. Now, microchipping is being considered for the tracking of individuals like the elderly, those with memory loss, and prisoners.
Supporters of microchip implants say they are safe and can be protected from being hacked. However, there are privacy concerns about the data transmitted from or stored on the microchip. These concerns go beyond those associated with location tracking.
Automated medical image analysis
EBBZS IT, based in Groningen, the Netherlands, intends to develop a system using artificial intelligence (AI) to help doctors at Joelstraat Hospital interpret medical images.
Due to the high resolution* of the digital images (see Figure 4), EBBZS IT claims the AI system will be able to learn from these images to assist doctors when diagnosing patients’ illnesses.
EBBZS IT also claims the AI system will be able to cope with the significant increase in the volume of patients and the increased complexity of their symptoms and conditions.
Figure 4: Examples of digital images used in the AI system

* resolution: the detail an image holds. It can be measured in pixels per centimetre.
Discuss the claim by EBBZS IT that the diagnosis of patients’ illnesses should be based on the information provided by the AI system.
RESOURCE BOOKLET: Implanted microchips
Source A: Graphic

**Source B: Series of message posts
**Posts from award-winning tech influencer and blogger @richtech

Source C: Article – Bans on microchipping employees
Many countries are passing laws that prohibit companies from requiring employees to have a device such as microchip or radio frequency identification device (RFID) tag implanted into their bodies as a condition of employment.
Employees can still be microchipped if they volunteer to do so. Tech4All, a technology company, has microchipped more than 50 of its employees. The company claims the microchips help people to open building doors, access their computers, and pay for items in the company restaurant.
It takes 40–60 days for the chip to settle under the skin. During this period, it can itch, and scratching is discouraged as it could dislodge the chip. The chips are relatively durable and will handle most bumps, but extreme pressure has been known to shatter them. The chips do not heat up or explode when anywhere near airport security scanners, but they may fail after a magnetic resonance imaging (MRI) scan.
Source D
Biohacking is the next stage in human evolution. Biohackers can optimize their bodies with a combination of gadgets, microchip implants, diets, or anything else they can put into their body to make it work better. The use of microchip implants is also an extension of the concept of the Internet of Things (IoT). By 2030, it is estimated that there will be more than 75 billion connected devices.
Microchips have been used in pets as form of identification to quickly reunite owners with lost or injured pets. Now, microchipping is being considered for the tracking of individuals like the elderly, those with memory loss, and prisoners.
Supporters of microchip implants say they are safe and can be protected from being hacked. However, there are privacy concerns about the data transmitted from or stored on the microchip. These concerns go beyond those associated with location tracking.