[ { "Question": "
\n

RESOURCE BOOKLET: Implanted microchips

\n

Source A: Graphic

\n

\n


Source B: Series of message posts
Posts from award-winning tech influencer and blogger @richtech

\n

\n


Source C: Article – Bans on microchipping employees

\n

Many countries are passing laws that prohibit companies from requiring employees to have a device such as microchip or radio frequency identification device (RFID) tag implanted into their bodies as a condition of employment.

\n

Employees can still be microchipped if they volunteer to do so. Tech4All, a technology company, has microchipped more than 50 of its employees. The company claims the microchips help people to open building doors, access their computers, and pay for items in the company restaurant.

\n

It takes 40–60 days for the chip to settle under the skin. During this period, it can itch, and scratching is discouraged as it could dislodge the chip. The chips are relatively durable and will handle most bumps, but extreme pressure has been known to shatter them. The chips do not heat up or explode when anywhere near airport security scanners, but they may fail after a magnetic resonance imaging (MRI) scan.

\n


Source D

\n

Biohacking is the next stage in human evolution. Biohackers can optimize their bodies with a combination of gadgets, microchip implants, diets, or anything else they can put into their body to make it work better. The use of microchip implants is also an extension of the concept of the Internet of Things (IoT). By 2030, it is estimated that there will be more than 75 billion connected devices.

\n

Microchips have been used in pets as form of identification to quickly reunite owners with lost or injured pets. Now, microchipping is being considered for the tracking of individuals like the elderly, those with memory loss, and prisoners.

\n

Supporters of microchip implants say they are safe and can be protected from being hacked. However, there are privacy concerns about the data transmitted from or stored on the microchip. These concerns go beyond those associated with location tracking.

\n
\n

Compare and contrast what Source C and Source D reveal about the implanting of microchips in humans.

\n
", "Markscheme": "
\n

Answers may include:

\n

Physical safety/health:

\n\n

Data privacy:

\n\n

Benefits of use/ease of access:

\n\n

Legal issues:

\n\n

Acceptance:

\n\n

Identification:

\n\n

Concerns:

\n\n

 

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "19M.2.SL.TZ0.3", "topics": [ "topic-3-content" ], "subtopics": [ "3-1-data" ] }, { "Question": "
\n

RESOURCE BOOKLET: Implanted microchips

\n

Source A: Graphic

\n

\n


Source B: Series of message posts
Posts from award-winning tech influencer and blogger @richtech

\n

\n


Source C: Article – Bans on microchipping employees

\n

Many countries are passing laws that prohibit companies from requiring employees to have a device such as microchip or radio frequency identification device (RFID) tag implanted into their bodies as a condition of employment.

\n

Employees can still be microchipped if they volunteer to do so. Tech4All, a technology company, has microchipped more than 50 of its employees. The company claims the microchips help people to open building doors, access their computers, and pay for items in the company restaurant.

\n

It takes 40–60 days for the chip to settle under the skin. During this period, it can itch, and scratching is discouraged as it could dislodge the chip. The chips are relatively durable and will handle most bumps, but extreme pressure has been known to shatter them. The chips do not heat up or explode when anywhere near airport security scanners, but they may fail after a magnetic resonance imaging (MRI) scan.

\n


Source D

\n

Biohacking is the next stage in human evolution. Biohackers can optimize their bodies with a combination of gadgets, microchip implants, diets, or anything else they can put into their body to make it work better. The use of microchip implants is also an extension of the concept of the Internet of Things (IoT). By 2030, it is estimated that there will be more than 75 billion connected devices.

\n

Microchips have been used in pets as form of identification to quickly reunite owners with lost or injured pets. Now, microchipping is being considered for the tracking of individuals like the elderly, those with memory loss, and prisoners.

\n

Supporters of microchip implants say they are safe and can be protected from being hacked. However, there are privacy concerns about the data transmitted from or stored on the microchip. These concerns go beyond those associated with location tracking.

\n
\n

To what extent do you agree that the advantages of implanting microchips in humans outweigh the concerns? Use all the sources and your own knowledge.

\n
", "Markscheme": "
\n

Answers may include:

\n

Advantages:

\n

Can enhance daily life:

\n\n

Used for identification:

\n\n

Theft prevention:        

\n\n

Safe to use

\n\n


Concerns:

\n

Legal:

\n\n

Health:

\n\n

Privacy: 

\n\n

Security:

\n\n

Implementation and reliability:

\n\n

Social acceptance:

\n\n

 

\n

Keywords: health, business, employment, health, laws, policies, regulations, implanted technologies, privacy, anonymity, surveillance, monitoring, compatibility, interoperability, wearable devices, security, authentication, accountability, reliability, acceptance, change, identity, power, systems, values and ethics

\n

 

\n

Refer to SL/HL paper 2 question 4 markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "19M.2.SL.TZ0.4", "topics": [ "topic-2-concepts" ], "subtopics": [ "2-1-change" ] }, { "Question": "
\n

Resource booklet: Responsible mobile device usage

\n


Source A

\n

\n

\n


Source B

\n

Data from two separate samples of teenagers aged 13 to 16. The samples were taken in the USA and included 1014 participants in 2013 and 1215 in 2019.

\n

\n


Source C

\n

The Family Sense app (see Figure 1) is designed to make families aware of how long they spend interacting with their mobile devices and encourage them to limit their screen time.

\n

Figure 1: The Family Sense app

\n

\n

The app collects information from each device. It logs data, such as how many times the device has been picked up, which apps are most frequently used, and how much overall time is spent on the device. This information is stored on the device and shared with all the family.

\n

The Family Sense app allows daily limits to be set for each family member. It also allows anyone in the family to enforce a one-hour period of screen-free time. People can still make and receive telephone calls, listen to music, etc., with their screens turned off, but the device will make a loud alarm sound if they try to use it for anything else.

\n


Source D

\n

Extract from a school newsletter to parents and caregivers on responsible mobile phone use for children and teenagers  

\n

Dear parents and caregivers,

\n

If your child has a mobile phone, we encourage you to discuss and agree on mobile phone usage rules that focus on safety issues and healthy habits. Some discussion points you might consider are:

\n\n

Respectfully,

\n

Principal Zhang

\n
\n

Identify two trends of social media usage that can be seen in Source A.

\n
", "Markscheme": "
\n

Answers may include:

\n\n


Award [1] for each relevant trend up to [2] marks.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "18M.2.SL.TZ0.1", "topics": [ "topic-3-content" ], "subtopics": [ "3-4-networks-and-the-internet" ] }, { "Question": "
\n

Resource booklet: Responsible mobile device usage

\n


Source A

\n

\n

\n


Source B

\n

Data from two separate samples of teenagers aged 13 to 16. The samples were taken in the USA and included 1014 participants in 2013 and 1215 in 2019.

\n

\n


Source C

\n

The Family Sense app (see Figure 1) is designed to make families aware of how long they spend interacting with their mobile devices and encourage them to limit their screen time.

\n

Figure 1: The Family Sense app

\n

\n

The app collects information from each device. It logs data, such as how many times the device has been picked up, which apps are most frequently used, and how much overall time is spent on the device. This information is stored on the device and shared with all the family.

\n

The Family Sense app allows daily limits to be set for each family member. It also allows anyone in the family to enforce a one-hour period of screen-free time. People can still make and receive telephone calls, listen to music, etc., with their screens turned off, but the device will make a loud alarm sound if they try to use it for anything else.

\n


Source D

\n

Extract from a school newsletter to parents and caregivers on responsible mobile phone use for children and teenagers  

\n

Dear parents and caregivers,

\n

If your child has a mobile phone, we encourage you to discuss and agree on mobile phone usage rules that focus on safety issues and healthy habits. Some discussion points you might consider are:

\n\n

Respectfully,

\n

Principal Zhang

\n
\n

Mobile devices provide many benefits for children but can also be used inappropriately. Some groups claim it is the responsibility of parents to ensure their children use their mobile devices responsibly, while other groups claim that responsibility lies with other stakeholders, such as schools.

\n

With reference to all the sources and your own knowledge, to what extent do you agree that parents should be responsible for ensuring their children develop safe and healthy habits for mobile device usage?

\n
", "Markscheme": "
\n

Answers may include:

\n

Role of parents:

\n\n

Role of schools:

\n\n


Responsibility of other stakeholders

Role of government:

\n\n

Role of social media companies:

\n\n

 

\n

Marking notes: It is not necessary to explicitly refer to each source to achieve the highest mark band, but there must be an explicit reference to at least two sources. To achieve the highest markband the sources must be synthesized in an integrated manner rather than a systematic analysis of each individual source.

\n

 

\n

Keywords: education, responsibility, accountability, privacy, anonymity, monitoring, surveillance, apps, social media, regulations, policies, laws, health, addiction, mental well-being, change, power, systems, ethics, values

\n

 

\n

Refer to SL/HL paper 2 question 4 markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "18M.2.SL.TZ0.4", "topics": [ "topic-2-concepts" ], "subtopics": [ "2-1-change" ] }, { "Question": "
\n

Resource booklet: Responsible mobile device usage

\n


Source A

\n

\n

\n


Source B

\n

Data from two separate samples of teenagers aged 13 to 16. The samples were taken in the USA and included 1014 participants in 2013 and 1215 in 2019.

\n

\n


Source C

\n

The Family Sense app (see Figure 1) is designed to make families aware of how long they spend interacting with their mobile devices and encourage them to limit their screen time.

\n

Figure 1: The Family Sense app

\n

\n

The app collects information from each device. It logs data, such as how many times the device has been picked up, which apps are most frequently used, and how much overall time is spent on the device. This information is stored on the device and shared with all the family.

\n

The Family Sense app allows daily limits to be set for each family member. It also allows anyone in the family to enforce a one-hour period of screen-free time. People can still make and receive telephone calls, listen to music, etc., with their screens turned off, but the device will make a loud alarm sound if they try to use it for anything else.

\n


Source D

\n

Extract from a school newsletter to parents and caregivers on responsible mobile phone use for children and teenagers  

\n

Dear parents and caregivers,

\n

If your child has a mobile phone, we encourage you to discuss and agree on mobile phone usage rules that focus on safety issues and healthy habits. Some discussion points you might consider are:

\n\n

Respectfully,

\n

Principal Zhang

\n
\n

Suggest two reasons why there has been a significant decrease in in-person communication with teenagers between 2013 and 2019 in Source B.

\n
", "Markscheme": "
\n

Answers may include:

\n\n


Award [1] for identifying each reason why there has been a significant decrease in in-person communication with teens from 2012 to 2018 and [1] for a development of that reason up to [2] marks. Award a maximum [4] marks.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "18M.2.SL.TZ0.2", "topics": [ "topic-3-content" ], "subtopics": [ "3-5-media" ] }, { "Question": "
\n

Resource booklet: Responsible mobile device usage

\n


Source A

\n

\n

\n


Source B

\n

Data from two separate samples of teenagers aged 13 to 16. The samples were taken in the USA and included 1014 participants in 2013 and 1215 in 2019.

\n

\n


Source C

\n

The Family Sense app (see Figure 1) is designed to make families aware of how long they spend interacting with their mobile devices and encourage them to limit their screen time.

\n

Figure 1: The Family Sense app

\n

\n

The app collects information from each device. It logs data, such as how many times the device has been picked up, which apps are most frequently used, and how much overall time is spent on the device. This information is stored on the device and shared with all the family.

\n

The Family Sense app allows daily limits to be set for each family member. It also allows anyone in the family to enforce a one-hour period of screen-free time. People can still make and receive telephone calls, listen to music, etc., with their screens turned off, but the device will make a loud alarm sound if they try to use it for anything else.

\n


Source D

\n

Extract from a school newsletter to parents and caregivers on responsible mobile phone use for children and teenagers  

\n

Dear parents and caregivers,

\n

If your child has a mobile phone, we encourage you to discuss and agree on mobile phone usage rules that focus on safety issues and healthy habits. Some discussion points you might consider are:

\n\n

Respectfully,

\n

Principal Zhang

\n
\n

Compare and contrast the effectiveness of the approaches outlined in Source C and Source D towards the responsible use of mobile devices.

\n
", "Markscheme": "
\n

Answers may include:

\n

Type of solution:

\n\n

Agency:

\n\n

Ease of use:

\n\n

Monitoring:

\n\n

Data collection:

\n\n


\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "18M.2.SL.TZ0.3", "topics": [ "topic-3-content" ], "subtopics": [ "3-5-media" ] }, { "Question": "
\n

Sentencing criminals using artificial intelligence (AI)

\n

In 10 states in the United States, artificial intelligence (AI) software is used for sentencing criminals. Once criminals are found guilty, judges need to determine the lengths of their prison sentences. One factor used by judges is the likelihood of the criminal re-offending*.

\n

The AI software uses machine learning to determine how likely it is that a criminal will re-offend. This result is presented as a percentage; for example, the criminal has a 90 % chance of re-offending. Research has indicated that AI software is often, but not always, more reliable than human judges in predicting who is likely to re-offend.

\n

There is general support for identifying people who are unlikely to re-offend, as they do not need to be sent to prisons that are already overcrowded.

\n

Recently, Eric Loomis was sentenced by the state of Wisconsin using proprietary AI software. Eric had to answer over 100 questions to provide the AI software with enough information for it to decide the length of his sentence. When Eric was given a six-year sentence, he appealed and wanted to see the algorithms that led to this sentence. Eric lost the appeal.

\n

On the other hand, the European Union (EU) has passed a law that allows citizens to challenge decisions made by algorithms in the criminal justice system.
 

\n
\n

* re-offending: committing another crime in the future

\n
\n

Identify two characteristics of artificial intelligence (AI) systems.

\n
[2]
\n
a.i.
\n
\n

Outline one problem that may arise if proprietary software rather than open-source software is used to develop algorithms.

\n
[2]
\n
a.ii.
\n
\n

The developers of the AI software decided to use supervised machine learning to develop the algorithms in the sentencing software.

\n

Identify two advantages of using supervised learning.

\n
[2]
\n
a.iii.
\n
\n

The developers of the AI software used visualizations as part of the development process.

\n

Explain one reason why visualizations would be used as part of the development process.

\n
[2]
\n
b.i.
\n
\n

Explain two problems the developers of the AI system could encounter when gathering the data that will be input into the AI system.

\n
[4]
\n
b.ii.
\n
\n

To what extent should the decisions of judges be based on algorithms rather than their knowledge and experience?

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n


Award [1] for identifying each characteristic of artificial intelligence systems up to a maximum of [2].

\n
a.i.
\n
\n

Answers may include:

\n\n


Award [1] for identifying a problem of using proprietary software and [1] for a development of that problem up to a maximum of [2].

\n
a.ii.
\n
\n

Answers may include:

\n\n


Award [1] for identifying each advantage of using supervised learning up to a maximum of [2].

\n
a.iii.
\n
\n

Answers may include:

\n\n


Award [1] for identifying a reason why visualizations may be used as part of the development process and [1] for a development of that reason up to a maximum of [2].

\n
b.i.
\n
\n

Answers may include:

\n\n

 

\n\n


Award [1] for identifying a problem the developers of the AI system will encounter when gathering the data that will be input into the AI system and [1] for a development of that reason up to a maximum of [2].

\n
b.ii.
\n
\n

Answers may include:

\n

Arguments for using algorithms

\n\n

Arguments against using algorithms

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: laws, standardized, transparency, accountability, judgement, bias, fairness, automation, machine learning, algorithm, reliability, change, power, systems, values

\n


Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document
.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.i.
\n
\n[N/A]\n
b.ii.
\n
\n[N/A]\n
c.
\n
", "question_id": "19M.1.SL.TZ0.4", "topics": [ "topic-2-concepts", "topic-3-content" ], "subtopics": [ "2-1-change", "3-6-artificial-intelligence", "3-2-algorithms", "3-1-data" ] }, { "Question": "
\n

How to appropriately interact in an online environment

\n

Increasing numbers of parents are claiming digital technologies that monitor online activities are the best way to protect their children from offensive content. A number of companies, such as mSpy and Qustodio, have developed online monitoring apps.

\n

Other parents claim it is not necessary to monitor their children’s online behaviour, preferring to encourage their children to develop the knowledge and skills to make appropriate choices.

\n

Parents can consider two different interventions to ensure their children use the online environment appropriately:

\n
    \n
  1. Monitor their children’s online behaviour using apps
  2. \n
  3. Encourage their children to develop the knowledge and skills to use the online environment and make appropriate choices.
  4. \n
\n

With reference to real-life scenarios, evaluate these two interventions.

\n
", "Markscheme": "
\n

Answers may include:

\n

Intervention 1: Online monitoring (claim)

\n

Advantages of monitoring online behaviour using apps:

\n\n

Disadvantages of monitoring online behaviour using apps:

\n\n

 

\n

Intervention 2: Developing online knowledge and skills (counter-claim)

\n

Advantages of encouraging the development of online skills (claims supporting the intervention):

\n\n

Disadvantages of encouraging the development of knowledge and online skills:

\n\n

 

\n

In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: home, online, health, social, family, relationships, trust, advice, software applications, apps, offensive, inappropriate, objectionable, content, change, expression, transparency, identity, power, ethics, values

\n

 

\n

Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "19M.1.HL.TZ0.5", "topics": [ "topic-4-contexts" ], "subtopics": [ "4-1-cultural" ] }, { "Question": "
\n

Students should be provided with the pre-release document ahead of the May 2018 HL paper 3 examination, this can be found under the \"Your tests\" tab > supplemental materials > May 2018 HL paper 3 pre-release document: Accessibility.

\n

 

\n

Improving the accessibility to the curriculum for children with special educational needs and disabilities (SEND)

\n

 

\n

Source 1: Tayton School

\n

Tayton School is a primary school that teaches 500 children aged between 5 and 12. There are three classes in each year group, with a maximum of 24 students in each class. The school’s motto is “Education for Everyone”, and inclusion is at the heart of the school’s mission.

\n

The school’s Inclusion Department consists of five full-time staff, led by Sandra, and 10 learning support assistants who are active in working with the children. Sandra has recently produced a report on the students with special educational needs and disabilities (SEND) in the school, in which she found that the increasing numbers of students, and the types of SEND, means that the schools needs to invest in expanding the amount of support for the students (see Table 1).

\n

Table 1: SEND at Tayton School

\n

\n

Sandra’s report argues that, next year, the work of the Inclusion Department would be more effective if the school purchased educational digital technologies, such as social robots and assistive technologies.

\n

 

\n

Source 2: Social robots in education

\n

Sandra researched social robots and came back to the department meeting with this information:

\n

In 2020, a report on the use of social robots in education was published by a prestigious university professor, who concluded that social robots have the potential to be a key player in education in the way textbooks and whiteboards have been in the past. A social robot has the potential to support students in ways that could never have been envisaged 20 years ago. However, there are significant technical limitations, particularly linked to the social robot’s ability to interact with students, that will restrict their usability for the next few years

\n

 

\n

Source 3: Mary sees the positives

\n

Mary, one of the learning assistants at Tayton School, says:

\n

“As a parent of two school-age children, I think the potential introduction of social robots has both advantages and disadvantages. My children thought the idea of having a robot that sits with them very exciting, and I think they would do what the robot asks without questioning it. The robot will also be much more patient while they are learning their times tables!” (See Figure 1).

\n

Figure 1: Students interacting with a social robot

\n

\n

[Source: pexels.com]

\n

 

\n

Source 4: James has doubts

\n

James, another learning assistant at Tayton School, is wary of the overuse of digital technology in schools for children with special needs based on his experiences in other schools. He has found some research that supports his ideas.

\n

\n

[Source: pexels.com]

\n
\n

Identify two characteristics of a social robot that will make it accepted by students.

\n
[2]
\n
a.
\n
\n

Tayton School has 30 students with attention deficit hyperactivity disorder (ADHD).

\n

Describe one assistive technology solution that could be used by these students.

\n
[2]
\n
b.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

Award [1] for each characteristic of a social robot identified up to [2] max.

\n
a.
\n
\n

Answers may include:

\n\n

 

\n\n

 

\n\n

 

\n

Award [1] for identifying an example of an assistive technology solution and [1] for the description of that assistive technology up to [2] max.

\n
b.
\n
", "Examiners report": "
\n[N/A]\n
a.
\n
\n[N/A]\n
b.
\n
", "question_id": "18M.3.HL.TZ0.1", "topics": [ "topic-3-content" ], "subtopics": [ "3-7-robots-and-autonomous-technologies" ] }, { "Question": "
\n

Should we completely automate journalism?

\n

Some of the news articles that you read are written by automated journalism software. This software uses algorithms and natural language generators to turn facts and trends into news stories.

\n

Narrative Science, a company that produces automated journalism software, predicts that by 2026 up to 90 % of news articles could be generated by machine learning algorithms.

\n

Discuss whether it is acceptable for news articles to be generated by automated journalism software.

\n
", "Markscheme": "
\n

Answers may include:

\n

Reasons why automated journalism software is acceptable (claim):

\n\n

Reasons why automated journalism software is not acceptable (counter-claim):

\n\n


Note to examiners – accept terms such as automated journalism
, algorithmic journalism or robotic journalism.

\n

In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n


Keywords: economic, regulations, codes, policies, transparency, accountability, bias, perspective, automation, machine learning, algorithm, change, power, systems, values

\n

 

\n

Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "19M.1.HL.TZ0.6", "topics": [ "topic-2-concepts" ], "subtopics": [ "2-1-change" ] }, { "Question": "
\n

Students should be provided with the pre-release document ahead of the May 2018 HL paper 3 examination, this can be found under the \"Your tests\" tab > supplemental materials > May 2018 HL paper 3 pre-release document: Accessibility.

\n

 

\n

Improving the accessibility to the curriculum for children with special educational needs and disabilities (SEND)

\n

 

\n

Source 1: Tayton School

\n

Tayton School is a primary school that teaches 500 children aged between 5 and 12. There are three classes in each year group, with a maximum of 24 students in each class. The school’s motto is “Education for Everyone”, and inclusion is at the heart of the school’s mission.

\n

The school’s Inclusion Department consists of five full-time staff, led by Sandra, and 10 learning support assistants who are active in working with the children. Sandra has recently produced a report on the students with special educational needs and disabilities (SEND) in the school, in which she found that the increasing numbers of students, and the types of SEND, means that the schools needs to invest in expanding the amount of support for the students (see Table 1).

\n

Table 1: SEND at Tayton School

\n

\n

Sandra’s report argues that, next year, the work of the Inclusion Department would be more effective if the school purchased educational digital technologies, such as social robots and assistive technologies.

\n

 

\n

Source 2: Social robots in education

\n

Sandra researched social robots and came back to the department meeting with this information:

\n

In 2020, a report on the use of social robots in education was published by a prestigious university professor, who concluded that social robots have the potential to be a key player in education in the way textbooks and whiteboards have been in the past. A social robot has the potential to support students in ways that could never have been envisaged 20 years ago. However, there are significant technical limitations, particularly linked to the social robot’s ability to interact with students, that will restrict their usability for the next few years

\n

 

\n

Source 3: Mary sees the positives

\n

Mary, one of the learning assistants at Tayton School, says:

\n

“As a parent of two school-age children, I think the potential introduction of social robots has both advantages and disadvantages. My children thought the idea of having a robot that sits with them very exciting, and I think they would do what the robot asks without questioning it. The robot will also be much more patient while they are learning their times tables!” (See Figure 1).

\n

Figure 1: Students interacting with a social robot

\n

\n

[Source: pexels.com]

\n

 

\n

Source 4: James has doubts

\n

James, another learning assistant at Tayton School, is wary of the overuse of digital technology in schools for children with special needs based on his experiences in other schools. He has found some research that supports his ideas.

\n

\n

[Source: pexels.com]

\n
\n

An assistive technology app and a social robot can help a student with the same lesson.

\n

Explain one interactive feature of a social robot that will help a student with the same lesson that an app would not be able to do.

\n
[3]
\n
a.
\n
\n

Explain one action that needs to be taken by the school so that the students can benefit from any assisted technology that is purchased.

\n
[3]
\n
b.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n\n

 

\n\n

 

\n

Award [1] for the social robot feature and [1] for the description of the feature, and [1] for an explanation of why it is different from the app up to [3] max.

\n
a.
\n
\n

Answers may include:

\n\n

 

\n\n

 

\n\n

 

\n\n

 

\n

Award [1] for the action identified, [1] for a description of the action, and [1] for an explanation of how the children benefit from the action up to [3] max.

\n
b.
\n
", "Examiners report": "
\n[N/A]\n
a.
\n
\n[N/A]\n
b.
\n
", "question_id": "18M.3.HL.TZ0.2", "topics": [ "topic-3-content" ], "subtopics": [ "3-7-robots-and-autonomous-technologies" ] }, { "Question": "
\n

Social media and political tension

\n

National governments sometimes block websites at a time of political tension. One example was in 2011, when a government prevented its citizens’ access to Twitter, Facebook and YouTube. Images on these websites were considered inappropriate, with the potential to cause hatred, violence and political unrest in that country. The national government gave direct orders to the internet service providers (ISPs) to block access to these sites for four hours. The aim was to give enough time for site officials to remove the offending images from their websites.

\n

Despite these attempts by the government, some citizens were still able to access these images using proxy servers.

\n

Many people, such as academics, believe that this approach is not appropriate and that governments should focus on the education of their citizens so that they are able to make informed decisions about how to react to potentially offensive information on websites and social media.

\n
\n

In addition to providing access to the internet, identify two functions of an internet service provider (ISP).

\n
[2]
\n
a.i.
\n
\n

Identify two characteristics of a proxy server.

\n
[2]
\n
a.ii.
\n
\n

Identify two ways that the government could have determined the identity of the persons responsible for posting the offensive images on social media.

\n
[2]
\n
a.iii.
\n
\n

Many schools block access to social networking websites like Twitter, Facebook and YouTube. However, other schools are investigating two different options:

\n\n

Analyse these two options.

\n
[6]
\n
b.
\n
\n

Many citizens have raised concerns about the surveillance of their web browsing history or the censorship of selected websites by their national government.

\n

To what extent is it appropriate for national governments to use surveillance and censorship to control citizens’ access to websites?

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n


 Award [1] for identifying each characteristic of an internet service provider up to a maximum of [2].

\n
a.i.
\n
\n

Answers may include:

\n\n


Award [1] for identifying each characteristic of a proxy server up to a maximum of [2].

\n
a.ii.
\n
\n

Answers may include:

\n\n

Information from the social media provider 

\n\n


N.B.:
Some students may take the alternative perspective that the identity of the person cannot be determined, only the device, for the same reasons as above.

\n

Award [1] for identifying each way that a government can determine the identity of the person responsible for posting the offending images on the social media up to a maximum of [2].

\n
a.iii.
\n
\n

Answers may include:

\n

Monitoring the network:

\n\n

Giving different ages different levels of access:

\n\n


Keywords: home, online, social, relationships, responsibility, trust, software applications, apps, objectionable content, change, expression, identity, power, values, ethics

\n
b.
\n
\n

Answers may include:

\n

Reasons that surveillance and censorship to control citizens’ access to websites is acceptable:

\n\n

Reasons that surveillance and censorship to control citizens’ access to websites is not acceptable:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: Automation, connectivity, change, power, systems, values, ethics, machine learning, accountability, transparency, autonomy, surveillance

\n

 

\n

Refer to SL/ HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "17N.1.SL.TZ0.2", "topics": [ "topic-3-content", "topic-2-concepts" ], "subtopics": [ "3-4-networks-and-the-internet", "2-1-change" ] }, { "Question": "
\n

Voice biometrics technology in banking

\n

CBR Bank is introducing voice biometrics technology that will authenticate customers when they telephone the bank. It will replace the current system, in which customers have to use passwords and/or security questions.

\n

As part of the registration process, the customer has to say the phrase, “My voice is my password” three times. This provides a voice print that will be used to verify the customer’s identity in future telephone calls to the bank.

\n
\n

In addition to their voice, identify two ways how a customer can be recognized by CBR Bank’s biometrics technology.

\n
[2]
\n
a.i.
\n
\n

Identify the steps used by the voice biometrics technology to authenticate a customer calling CBR Bank.

\n
[4]
\n
a.ii.
\n
\n

CBR Bank holds a large amount of information on its customers. Some customers are concerned about the security, privacy and anonymity of their data.

\n

For each of the concerns above, explain one policy that CBR Bank could use to address the concerns of its customers.

\n
[6]
\n
b.
\n
\n

The chief executive officer (CEO) of CBR Bank, Alice McEwan, said in a recent interview, “CBR Bank will be replacing all passwords, PINs and personal verification questions for our online banking and mobile banking with voice biometrics recognition.”

\n

To what extent are the changes proposed by Alice beneficial for both CBR Bank’s customers and CBR Bank’s IT support?

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n


Do not accept “eye recognition” – this is too vague. Iris or retina is required for marks.

\n

Award [1] for identifying each form of biometric identification up to a maximum of [2].

\n
a.i.
\n
\n

Answers may include:

\n\n


Award [1] for identifying each of the steps used to authenticate a customer calling CBR Bank up to a maximum of [4].

\n
a.ii.
\n
\n

Answers may include:

\n

Security:

\n\n

Privacy:

\n\n

Anonymity:

\n\n

 

\n

N.B.: The response requires an explanation of a policy and not a discussion of the problems themselves. There must be a policy for each kind of concern: security, privacy and anonymity and reason(s).

\n

Award [1] for identifying a policy that CBR Bank could use to address the security, privacy and anonymity concerns of its customers and [1] for a development of the policy identified up to a maximum of [2].

\n

Mark as [2] + [2] + [2].

\n
b.
\n
\n

Answers may include:

\n

For customers:

\n

Advantages of replacing passwords with biometric voice recognition:

\n\n

Disadvantages of replacing passwords with biometric voice recognition:

\n\n

 

\n

For IT support:

\n

Advantages of replacing passwords with biometric voice recognition:

\n\n

Disadvantages of replacing passwords with biometric voice recognition:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: security, authentication, stakeholder, reliability, data, security, change, identity, power, systems, values, ethics, accountability, transparency, access, inclusion

\n


Refer to SL/ HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "17N.1.SL.TZ0.1", "topics": [ "topic-3-content", "topic-2-concepts" ], "subtopics": [ "3-4-networks-and-the-internet", "3-1-data", "2-1-change" ] }, { "Question": "
\n

Hurricane warning systems

\n

In 2017, Hurricane Irma was a catastrophic disaster. Unfortunately, the computer models and simulations did not accurately predict its track (course) in time to warn residents in the areas affected. Accurately predicting the track of a hurricane is critical for protecting life and property.

\n

The potential tracks that Hurricane Irma could have taken are shown in Figure 2.

\n

Figure 2: Potential tracks of Hurricane Irma

\n

\n

The European computer model, run by the European Centre for Medium-Range Weather Forecasts, performed far better than the American model, known as the Global Forecast System. However, a new model created by the electronics company Panasonic, called PWS, performed best.

\n

The American and European models depend on data gathered from weather balloons. Panasonic, on the other hand, creates systems that collect real-time weather data from over 3500 aircraft every day.

\n

The PWS model resulted in accurate simulations of the track of the hurricane four to seven days in advance.

\n
\n

Identify two types of digital media that could be used to show the potential tracks of Hurricane Irma.

\n
[2]
\n
a.i.
\n
\n

Outline one problem that may be caused by gathering data in real time.

\n
[2]
\n
a.ii.
\n
\n

Outline why visualization is used to present data.

\n
[2]
\n
a.iii.
\n
\n

Distinguish between data and information.

\n
[2]
\n
b.i.
\n
\n

Different weather variables, such as wind speed and temperature, need to be collected in order to predict the track of a hurricane. Wind speed data is sampled more frequently than temperature data in a hurricane.

\n

Explain one reason why wind speed data would be sampled more frequently than temperature data in a hurricane.

\n
[2]
\n
b.ii.
\n
\n

Explain why the data collected about Hurricane Irma was not encrypted prior to being transmitted.

\n
[2]
\n
b.iii.
\n
\n

Companies such as Panasonic will not make the data in computer models available to governments, as they are concerned that doing so would compromise their commercial interests.

\n

Discuss whether governments should be able to make private companies such as Panasonic share their data.

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n


Award [1] for identifying each type of digital media that could be used to show the potential tracks of Hurricane Irma up to a maximum of [2].

\n
a.i.
\n
\n

Answers may include:

\n\n


Award [1] for identifying each problem, and [1] for a development of that problem up to a maximum of [2].

\n
a.ii.
\n
\n

Answers may include:

\n\n

 

\n\n

 

\n

Award [1] for identifying a reason why visualization is used and [1] for a development of that reason up to a maximum of [2].

\n
a.iii.
\n
\n

Answers may include:

\n\n


Award [1] for a definition of either data or information and [1] for a definition of both up to a maximum of [2].

\n
b.i.
\n
\n

Answers may include:

\n\n

 

\n\n

 

\n\n

 

\n\n

 

\n

Award [1] for identifying each reason why wind speed data would be sampled more frequently than temperature data in a hurricane and [1] for a development of that reason up to a maximum of [2].

\n
b.ii.
\n
\n

Answers may include:

\n\n

 

\n\n

 

\n\n

 

\n\n

 

\n

Award [1] for identifying a reason why the data being collected about the hurricane does not need to be encrypted and [1] for a development of that reason up to a maximum of [2].

\n
b.iii.
\n
\n

Answers may include:

\n

It is acceptable for governments to make private companies such as Panasonic share their data:

\n\n


It is not acceptable for governments to make private companies such as Panasonic share their data:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.  

\n

Keywords: laws, environment, knowledge, data, sharing, algorithms, ownership, accountability, change, power, systems, ethics, values

\n


Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document
.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.i.
\n
\n[N/A]\n
b.ii.
\n
\n[N/A]\n
b.iii.
\n
\n[N/A]\n
c.
\n
", "question_id": "19M.1.SL.TZ0.2", "topics": [ "topic-3-content", "topic-2-concepts" ], "subtopics": [ "3-1-data", "2-1-change", "3-5-media" ] }, { "Question": "
\n

Sports watches used in physical education (PE) lessons

\n

Sports watches are now used with high school students (aged 11–18) in their physical education lessons at Collège Earlet in Quebec. Students wear the device around their wrist during sports and fitness activities. In some lessons, teachers can use their tablet to see the students’ vital signs* provided by the sports watches and even project the information for all students to see (see Figure 1).

\n

Before the lesson, teachers set heart rate targets, measured in beats per minute (bpm), for each student. During the lesson, students should aim to stay within their recommended heart rate limits. After the lesson, the software will email the students a summary of their heart rate data, as well as a number of other vital signs recorded by the sports watch, with a copy sent to their teachers and parents.

\n

Figure 1: Sports watch showing the heart rate of a student

\n

\n

 

\n
\n

* vital signs: signs of life used to monitor medical problems (such as heart rate)

\n
\n

Apart from heart rate, identify two vital signs that could be recorded by the sports watch.

\n
[2]
\n
a.i.
\n
\n

At the start of each lesson, the student is asked to set their maximum heart rate on the watch to 220 bpm - their age; so in the case of a 15-year-old, it would be 220 bpm − 15 = 205 bpm.

\n

Identify the steps used by the software in the sports watch to encourage students not to exceed their maximum heart rate.

\n
[4]
\n
a.ii.
\n
\n

Explain one advantage for the student of using these monitoring devices.

\n
[2]
\n
b.i.
\n
\n

Explain one advantage for the teacher if their students use these monitoring devices.

\n
[2]
\n
b.ii.
\n
\n

Explain why the reliability of the sports watches may be a concern for the teachers.

\n
[2]
\n
b.iii.
\n
\n

The principal at Collège Earlet has been discussing arrangements for sharing data from the students’ watches with a third party, Fitness World.

\n

Discuss whether the principal at Collège Earlet should agree to share data that has been collected by the students’ watches with Fitness World.

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n


N.B.:
In the context of a digital society course, it is not expected that candidates know the medical definition of a “vital sign”.

\n

Award [1] for identifying each vital sign that could be monitored by the teachers up to a maximum of [2].

\n
a.i.
\n
\n

Answers may include:

\n\n


Award [1] for identifying each of the steps used by the sports watch to ensure that students stay within their recommended heart rate zone up to a maximum of [4]
.

\n
a.ii.
\n
\n

Answers may include:

\n\n


Award [1] for identifying an advantage for the student of using these monitoring devices and [1] for a development of the policy identified up to a maximum of [2].

\n
b.i.
\n
\n

Answers may include:

\n\n


Award [1] for identifying an advantage for the teacher if their students are using these monitoring devices and [1] for a development of the policy identified up to a maximum of [2].

\n
b.ii.
\n
\n

Answers may include:

\n\n


Award [1] for identifying a reason why the reliability of the sports watches may be a concern for the teachers and [1] for a development of the reason identified up to a maximum of [2].

\n
b.iii.
\n
\n

Answers may include:

\n

Reasons for sharing the data with Fitness World:

\n\n

Reasons for not sharing the data with Fitness World:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: automation, change, power, systems, values, ethics, data, accountability, anonymity, privacy, surveillance

\n

 

\n

Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
b.i.
\n
\n[N/A]\n
b.ii.
\n
\n[N/A]\n
b.iii.
\n
\n[N/A]\n
c.
\n
", "question_id": "17N.1.SL.TZ0.3", "topics": [ "topic-3-content", "topic-4-contexts", "topic-2-concepts" ], "subtopics": [ "3-1-data", "3-2-algorithms", "4-4-health", "2-1-change" ] }, { "Question": "
\n

Students should be provided with the pre-release document ahead of the May 2019 HL paper 3 examination, this can be found under the \"Your tests\" tab > supplemental materials > May 2019 HL paper 3 pre-release document: AV.

\n

 

\n

Mobility challenges for the elderly, young, disadvantaged, and handicapped.

\n


Source 1: Miketon

\n

Miketon is a small town with a population of 5000. It has one taxi company with two drivers who are about to retire. There are no plans for the taxi company to continue. The town council is aware that this will create problems for the elderly citizens who live in the community. The council predicts that this problem will grow, as there are increasing numbers of elderly people retiring to the area.

\n

Miketon is 20 km from the regional centre, Towbro, which has a population of 300 000. As a result of this closeness, it is also popular with young families, as it is within commuting* distance (see Figure 1).

\n

Figure 1: Map showing the locations of Miketon and Towbro

\n

\n

The loss of the taxi service and an infrequent bus service to Towbro will create problems for both the elderly, who need access to the hospital, and for teenagers who wish to attend cultural and sporting events in Towbro.

\n
\n

* Commuting: to travel some distance between one's home and place of work on a regular basis.

\n

 

\n

Source 2: Miketon Town Council

\n

Miketon Town Council wants to solve this problem and has two suggestions they will put forward at the next council meeting.

\n
    \n
  1. A fleet of autonomous vehicles is purchased by the council that could be used by anyone in the town at a subsidized rate. All bookings would be made through the council website or the council transport app. The autonomous vehicles would easily cover the distances between the regional centre and other locations.
  2. \n
  3. A ride-share company is invited to start operations in Miketon. To entice companies and local drivers to participate, the council would subsidize the trips by paying a surcharge (an amount added to the fare), which would be credited to the ride-share drivers and company.
  4. \n
\n

Both suggestions have advantages as well as limitations.

\n

 

\n

Source 3: Readiness for autonomous vehicles

\n

Each country can be graded using criteria that determine how ready it is for autonomous vehicles. The grade can be either very ready, ready, or not ready. Four of the criteria used to determine the readiness of the country in which Miketon is located are shown in Figure 2.

\n

Figure 2: Criteria and scores for the country in which Miketon is located

\n

\n

 

\n

Source 4: A pilot study of a ride-sharing scheme called Rideshare

\n

The findings of the Rideshare pilot scheme (see Figure 3), show that by carefully designing the integration of ride sharing with public transport services, the ride-sharing scheme can be successful to a significant extent.

\n

Figure 3 Rideshare board

\n

\n

Three features of the Rideshare pilot scheme were:

\n
    \n
  1. It was developed and implemented with the support of the local council and citizens.
  2. \n
  3. Ride-sharing notice boards with information about the services were placed at local bus stops and in railway stations to promote the use of these services in an integrated way.
  4. \n
  5. The pricing strategy ensured that ride sharing was so expensive that it deterred people from using it and not too cheap that it stopped people using public transport.
  6. \n
\n
\n

Identify two ways how an autonomous vehicle can verify it is collecting the right passenger.

\n
[2]
\n
a.
\n
\n

Identify two characteristics of ride-sharing apps that have made them popular

\n
[2]
\n
b.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n

Award [1] for each way how the autonomous vehicle could verify it was picking up the right passenger, up to [2] max.

\n
a.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for each characteristic of a ride-sharing app identified up to [2] max.

\n
b.
\n
", "Examiners report": "
\n[N/A]\n
a.
\n
\n[N/A]\n
b.
\n
", "question_id": "19M.3.HL.TZ0.1", "topics": [ "topic-3-content" ], "subtopics": [ "3-7-robots-and-autonomous-technologies", "3-3-computers" ] }, { "Question": "
\n

Students should be provided with the pre-release document ahead of the May 2018 HL paper 3 examination, this can be found under the \"Your tests\" tab > supplemental materials > May 2018 HL paper 3 pre-release document: Accessibility.

\n

 

\n

Improving the accessibility to the curriculum for children with special educational needs and disabilities (SEND)

\n

 

\n

Source 1: Tayton School

\n

Tayton School is a primary school that teaches 500 children aged between 5 and 12. There are three classes in each year group, with a maximum of 24 students in each class. The school’s motto is “Education for Everyone”, and inclusion is at the heart of the school’s mission.

\n

The school’s Inclusion Department consists of five full-time staff, led by Sandra, and 10 learning support assistants who are active in working with the children. Sandra has recently produced a report on the students with special educational needs and disabilities (SEND) in the school, in which she found that the increasing numbers of students, and the types of SEND, means that the schools needs to invest in expanding the amount of support for the students (see Table 1).

\n

Table 1: SEND at Tayton School

\n

\n

Sandra’s report argues that, next year, the work of the Inclusion Department would be more effective if the school purchased educational digital technologies, such as social robots and assistive technologies.

\n

 

\n

Source 2: Social robots in education

\n

Sandra researched social robots and came back to the department meeting with this information:

\n

In 2020, a report on the use of social robots in education was published by a prestigious university professor, who concluded that social robots have the potential to be a key player in education in the way textbooks and whiteboards have been in the past. A social robot has the potential to support students in ways that could never have been envisaged 20 years ago. However, there are significant technical limitations, particularly linked to the social robot’s ability to interact with students, that will restrict their usability for the next few years

\n

 

\n

Source 3: Mary sees the positives

\n

Mary, one of the learning assistants at Tayton School, says:

\n

“As a parent of two school-age children, I think the potential introduction of social robots has both advantages and disadvantages. My children thought the idea of having a robot that sits with them very exciting, and I think they would do what the robot asks without questioning it. The robot will also be much more patient while they are learning their times tables!” (See Figure 1).

\n

Figure 1: Students interacting with a social robot

\n

\n

[Source: pexels.com]

\n

 

\n

Source 4: James has doubts

\n

James, another learning assistant at Tayton School, is wary of the overuse of digital technology in schools for children with special needs based on his experiences in other schools. He has found some research that supports his ideas.

\n

\n

[Source: pexels.com]

\n
\n

The students with special educational needs and disabilities (SEND) want to be included in school activities and have appropriate access to the curriculum. 

\n

The two interventions influence a student’s identity in the classroom.

\n

Evaluate the impact of educational digital technologies, such as social robots and assistive technologies, on the identity of students with SEND in Tayton School.

\n
", "Markscheme": "
\n

Answers may include:

\n

Social robots and a student’s identity

\n\n

Assistive technology and a student’s identity

\n\n

Both technologies and a student’s identity

\n\n

 

\n

Note to examiners: When discussing the concept of identity, a balance of arguments related to how the technologies will impact the student need to be discussed.

\n


Keywords: identity, ethics, values, data, app, social robot, assistive technologies, hardware, relationships, accessibility, mitigation, access, inclusion.

\n

 

\n

Please refer to the HL paper 3 question 3 markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "18M.3.HL.TZ0.3", "topics": [ "topic-5-hl-extension" ], "subtopics": [ "5-1-global-well-being" ] }, { "Question": "
\n

Digital currency

\n

Bitcoin is a type of digital currency (cryptocurrency). This is money that can be sent via the internet and exchanged for goods, services, or money in different currencies. Users can buy bitcoins using real money, and bitcoins can either be spent or stored in a digital wallet for later use. Bitcoins can be used in every country, and sending bitcoins is as simple as sending an email.

\n

A bitcoin wallet is an application that can be installed on a computer or mobile device. Once a bitcoin wallet is installed, the user will get a bitcoin address to use when transferring bitcoins to and from the wallet. This transfer uses private and public key encryption. Users should have a strong password to access their bitcoin wallet.

\n

Bitcoin operates on a peer-to-peer (P2P) network, and users of bitcoins are identified by their bitcoin address. Some users of bitcoins wish to remain anonymous, but this is not always possible.

\n
\n

Identify two characteristics of a peer-to-peer (P2P) network.

\n
[2]
\n
a.i.
\n
\n

Identify two characteristics of a strong password.

\n
[2]
\n
a.ii.
\n
\n

The use of a password is one method of authentication.

\n

Identify two other methods of authentication.

\n
[2]
\n
a.iii.
\n
\n

Explain one reason why bitcoin makes use of encryption when transmitting data.

\n
[2]
\n
b.i.
\n
\n

Explain one reason why it may be difficult to ensure the security of information in a large peer-to-peer network such as bitcoin.

\n
[2]
\n
b.ii.
\n
\n

Some users of bitcoins are concerned that their anonymity may be compromised by their bitcoin address.

\n

Explain one way in which a bitcoin address may be used to reveal information about a bitcoin user.

\n
[2]
\n
b.iii.
\n
\n

Bitcoin transactions are made between individuals without the knowledge of banks, governments, or credit card companies. Some governments are investigating whether they should regulate digital transactions, such as those made using bitcoins.

\n

To what extent is it appropriate for governments to regulate digital transactions, such as those made using bitcoins?

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n


Award [1] mark for identifying each characteristic of a peer-to-peer network up to a maximum of [2] marks.

\n
a.i.
\n
\n

Answers may include:

\n\n


Award [1] mark for identifying each characteristic of a strong password up to a maximum of [2] marks.

\n
a.ii.
\n
\n

Answers may include:

\n\n


Award [1] mark for identifying each additional method of authentication up to a maximum of [2] marks.

\n
a.iii.
\n
\n

Answers may include:

\n\n


Award [1] for the reason why encryption is used when transmitting data and an additional [1] for the explanation up to a maximum of [2].

\n
b.i.
\n
\n

Answers may include:

\n\n\n


Award [1] for the reason why the security of information may be difficult to maintain in a large peer-to-peer network such as bitcoin and an additional [1] for the explanation up to a maximum of [2].

\n
b.ii.
\n
\n

Answers may include:

\n\n


Award [1] for identifying how a bitcoin address may be used to reveal the name of a bitcoin user and an additional [1] for the explanation up to a maximum of [2] marks.

\n
b.iii.
\n
\n

Answers may include:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: laws, regulations, environment, cryptocurrency, privacy, anonymity, surveillance, change, power, systems, values

\n

 

\n

Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.i.
\n
\n[N/A]\n
b.ii.
\n
\n[N/A]\n
b.iii.
\n
\n[N/A]\n
c.
\n
", "question_id": "18M.1.SL.TZ0.2", "topics": [ "topic-3-content", "topic-2-concepts" ], "subtopics": [ "3-4-networks-and-the-internet", "3-1-data", "2-1-change" ] }, { "Question": "
\n

Students should be provided with the pre-release document ahead of the May 2019 HL paper 3 examination, this can be found under the \"Your tests\" tab > supplemental materials > May 2019 HL paper 3 pre-release document: AV.

\n

 

\n

Mobility challenges for the elderly, young, disadvantaged, and handicapped.

\n


Source 1: Miketon

\n

Miketon is a small town with a population of 5000. It has one taxi company with two drivers who are about to retire. There are no plans for the taxi company to continue. The town council is aware that this will create problems for the elderly citizens who live in the community. The council predicts that this problem will grow, as there are increasing numbers of elderly people retiring to the area.

\n

Miketon is 20 km from the regional centre, Towbro, which has a population of 300 000. As a result of this closeness, it is also popular with young families, as it is within commuting* distance (see Figure 1).

\n

Figure 1: Map showing the locations of Miketon and Towbro

\n

\n

The loss of the taxi service and an infrequent bus service to Towbro will create problems for both the elderly, who need access to the hospital, and for teenagers who wish to attend cultural and sporting events in Towbro.

\n
\n

* Commuting: to travel some distance between one's home and place of work on a regular basis.

\n

 

\n

Source 2: Miketon Town Council

\n

Miketon Town Council wants to solve this problem and has two suggestions they will put forward at the next council meeting.

\n
    \n
  1. A fleet of autonomous vehicles is purchased by the council that could be used by anyone in the town at a subsidized rate. All bookings would be made through the council website or the council transport app. The autonomous vehicles would easily cover the distances between the regional centre and other locations.
  2. \n
  3. A ride-share company is invited to start operations in Miketon. To entice companies and local drivers to participate, the council would subsidize the trips by paying a surcharge (an amount added to the fare), which would be credited to the ride-share drivers and company.
  4. \n
\n

Both suggestions have advantages as well as limitations.

\n

 

\n

Source 3: Readiness for autonomous vehicles

\n

Each country can be graded using criteria that determine how ready it is for autonomous vehicles. The grade can be either very ready, ready, or not ready. Four of the criteria used to determine the readiness of the country in which Miketon is located are shown in Figure 2.

\n

Figure 2: Criteria and scores for the country in which Miketon is located

\n

\n

 

\n

Source 4: A pilot study of a ride-sharing scheme called Rideshare

\n

The findings of the Rideshare pilot scheme (see Figure 3), show that by carefully designing the integration of ride sharing with public transport services, the ride-sharing scheme can be successful to a significant extent.

\n

Figure 3 Rideshare board

\n

\n

Three features of the Rideshare pilot scheme were:

\n
    \n
  1. It was developed and implemented with the support of the local council and citizens.
  2. \n
  3. Ride-sharing notice boards with information about the services were placed at local bus stops and in railway stations to promote the use of these services in an integrated way.
  4. \n
  5. The pricing strategy ensured that ride sharing was so expensive that it deterred people from using it and not too cheap that it stopped people using public transport.
  6. \n
\n
\n

Explain how Miketon Town Council could encourage its citizens to use the ride-sharing app.

\n
[3]
\n
a.
\n
\n

Explain why an autonomous vehicle may not choose the best route from Miketon to Towbro, the regional centre.

\n
[3]
\n
b.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n\n

 

\n\n

 

\n

Award [1] for identifying the action taken by the council, [1] if the action is described in the context of the village and ride-share app and [1] if its action explains how it would encourage the use of the ride-share app up to [3] max.

\n
a.
\n
\n

Answers may include:

\n

Basic process by the autonomous vehicle guidance system:

\n\n

 

\n\n

 

\n\n

 

\n\n

 

\n

Award [1] for identifying how and/or why the autonomous vehicle chose the route, [1] for describing how the problem occurs and [1] for explaining why it is not the best route up to a maximum of [3].

\n

No reference to the autonomous nature of the car, award maximum [2] marks.

\n
b.
\n
", "Examiners report": "
\n[N/A]\n
a.
\n
\n[N/A]\n
b.
\n
", "question_id": "19M.3.HL.TZ0.2", "topics": [ "topic-3-content" ], "subtopics": [ "3-3-computers", "3-2-algorithms" ] }, { "Question": "
\n

Voice simulation

\n

Lyrebird voice-cloning software was created by three university students from Montreal. This technology was originally developed to change the lives of people who have lost their voice. These people can use the software to create a new voice by choosing one from samples provided in the software.

\n

However, Lyrebird can also clone voices. Lyrebird claims that it can clone a person’s voice in just 60 seconds. Users only need to access the website, create an account, and generate a voice print by repeating a number of predetermined sentences. Although the cloning is not perfect, the developers of Lyrebird believe that both the time to clone the voice and the quality of the cloning will improve in the future.

\n

The software allows the user to alter the speech and add emotion (such as, anger, elation, and surprise), increasing the ways in which it can be used.

\n

The initial voice print for the cloning process requires the most time and a lot of processing power. However, creating speech from the voice print is a simple process, generating around 1000 sentences almost instantly. The voice print is saved as a compressed audio file.

\n

Lyrebird has considered the ethical issues regarding biometrics* and acknowledges that it highlights some key societal issues. Lyrebird has taken the decision to make the software available to all in an attempt to address these issues.

\n
\n

* biometrics: a means of personal identification through analysis of unique physical traits or behavioural characteristics (for example, through voice patterns or fingerprints)

\n
\n

Lyrebird uses a person’s voice print to determine their identity.

\n

Identify three other methods of biometric identification that could be used to determine a person’s identity.

\n
[3]
\n
a.i.
\n
\n

A person’s voice print can be compressed. 

\n

Identify three problems that may result from compressing the voice print.

\n
[3]
\n
a.ii.
\n
\n

Analyse whether it would be appropriate for Lyrebird to release the biometric data of a user to a third party.

\n
[6]
\n
b.
\n
\n

To what extent do the benefits of using Lyrebird’s voice-cloning software outweigh the concerns that may arise from its use?

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n

Award [1] for each method of biometric feature identified up to [3] marks.

\n
a.i.
\n
\n

Answers may include:

\n\n

 

\n

 Award [1] for each problem that may result from compressing the voice print identified up to [3] marks.

\n
a.ii.
\n
\n

Answers may include:

\n

It would be appropriate:

\n\n

It would not be appropriate:

\n\n

 

\n

Keywords: legality, regulation, policies, privacy, anonymity, security, transparency, ownership, access, sharing, consent, data, GDPR, power, ethics, values

\n
b.
\n
\n

Answers may include:

\n

Benefits may include:

\n\n

Concerns may include:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: health, privacy, anonymity, security, transparency, ownership, access, authentication, sharing, expression, identity, power, values

\n

 

\n

Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "21M.1.SL.TZ0.3", "topics": [ "topic-3-content", "topic-4-contexts" ], "subtopics": [ "3-4-networks-and-the-internet", "3-1-data", "4-1-cultural" ] }, { "Question": "
\n

Electronic voting (e-voting)

\n

E-voting is a form of voting that uses a computer instead of a printed ballot paper. Voters go to a polling station and cast their vote using an electronic voting machine (EVM), such as the one shown in Figure 3.

\n

Voters must be authenticated by the system before casting their vote. The votes are then stored in an encrypted form in a relational database.

\n

The graphical user interface (GUI) of the EVM can be adjusted for different voters. For example, the font size can be increased for voters who have limited vision.

\n

Figure 3: Example of an electronic voting machine (EVM)

\n

\n

[Source: cmannphoto/iStock]

\n

E-voting is already used for local elections in the towns and cities of several countries, such as Belgium, Canada and Estonia. Countries such as Finland are now considering whether to use e-voting for the whole population in their national elections.

\n
\n

In addition to adaptable font size, identify two features of the e-voting graphical user interface (GUI) that could be customized to make it accessible for all voters.

\n
[2]
\n
a.i.
\n
\n

Identify two features of authentication.

\n
[2]
\n
a.ii.
\n
\n

Identify two features of encryption.

\n
[2]
\n
a.iii.
\n
\n

Elections using e-voting in countries such as Finland will create significant amounts of personal data. The government of Finland will have to ensure it has appropriate policies for the collection, storage and sharing of the data.

\n

Explain why it is important to have an appropriate policy for the collection, storage and sharing of the data from elections that use e-voting.

\n
[6]
\n
b.
\n
\n

Evaluate the advantages and disadvantages of e-voting.

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n


Award [1] for identifying each aspect of the GUI that could be customized, up to a maximum of [2].

\n
a.i.
\n
\n

Answers may include:

\n\n


Award [1] for identifying each feature of authentication up to a maximum of [2].

\n
a.ii.
\n
\n

Answers may include:

\n\n


Award [1] for identifying each feature of encryption up to a maximum of [2].

\n
a.iii.
\n
\n

Answers may include: 

\n

Collection of data

\n\n

 

\n\n


Award [1] for identifying an appropriate policy for the collection of the data and [1] for an explanation for why it is appropriate up to a maximum of [2].

\n

 

\n

Storage of data

\n\n

 

\n\n

 

\n\n


Award [1] for identifying an appropriate policy for the storage of the data and [1] for an explanation for why it is appropriate up to a maximum of [2].
 

\n

 

\n

Sharing of data

\n\n

 

\n\n


Award [1] for identifying an appropriate policy for the sharing of the data and [1] for an explanation for why it is appropriate up to a maximum of [2].
 

\n


Mark as [2] + [2] + [2].

\n
b.
\n
\n

Answers may include:

\n

Advantages of e-voting

\n\n


Disadvantages of e-voting

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.  

\n

Keywords: voting, reliability, transparency, accountability, trust, automation, intuitive, identification, authentication, security, cost, change, expression, power, systems, values

\n

 

\n

Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "19M.1.SL.TZ0.3", "topics": [ "topic-3-content", "topic-4-contexts", "topic-2-concepts" ], "subtopics": [ "3-3-computers", "3-4-networks-and-the-internet", "3-1-data", "4-6-political", "2-1-change" ] }, { "Question": "
\n

Sports photographs

\n

ACP is a company that specializes in taking photographs of participants in large sporting events, such as cycling and running events. ACP recently photographed the participants in a cycle event (see Figure 2).

\n

Figure 2: An example of a low-resolution image that includes a watermark from the ACP website

\n

\n

ACP’s photographers were positioned at five different points on the course, including the start and finish lines. Each photographer is equipped with a digital camera that takes high-resolution images1. The photographer’s job is to photograph as many participants as possible.

\n

After the event, the photographs are compressed and transferred from each camera’s memory card to the ACP database. The photographs have tags added by the software, which recognizes the race participant by the number pinned to their bike.

\n

The images for each participant have their resolution reduced and are watermarked2 before they are added to ACP’s website. The participants are then able to purchase high-resolution copies of the photographs that do not have watermarks.

\n

It is also possible for anybody who views the image to purchase and download a high-resolution copy.

\n
\n

1 resolution: the detail an image holds. It can be measured in pixels per centimetre.

\n

2 watermark: a message (usually a logo, stamp, or signature) superimposed onto an image

\n
\n

Identify two types of digital media ACP could use on its website.

\n
[2]
\n
a.i.
\n
\n

Identify two file compression techniques.

\n
[2]
\n
a.ii.
\n
\n

Outline one problem that may be caused by the use of file compression techniques.

\n
[2]
\n
a.iii.
\n
\n

Explain why each image has its resolution reduced before it is uploaded to ACP’s website.

\n
[3]
\n
b.i.
\n
\n

Explain why each image is watermarked before it is uploaded to ACP’s website.

\n
[3]
\n
b.ii.
\n
\n

Some people feel uncomfortable about having their photographs taken and posted on a public website.

\n

To what extent is it acceptable for ACP to take photographs of participants, post them online, and sell them without asking their permission?

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each type of digital media ACP could use on its website up to maximum of [2].

\n
a.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each appropriate technique up to maximum of [2].

\n
a.ii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying a problem of using file compression techniques and [1] for a development of that problem up to maximum of [2].

\n
a.iii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying a reason why each image has its resolution reduced and [1] for each subsequent development of that problem up to maximum of [3].

\n
b.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying a reason why each image is watermarked and [1] for each subsequent development of that problem up to maximum of [3].

\n
b.ii.
\n
\n

Answers may include:

\n

Arguments for it being acceptable:

\n\n

Arguments for it not being acceptable:

\n\n


In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: data, privacy, anonymity, images, security, authenticity, consent, online forums, sub-culture, online marketplaces, change, power, values, ethics

\n

 

\n

Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.i.
\n
\n[N/A]\n
b.ii.
\n
\n[N/A]\n
c.
\n
", "question_id": "18N.1.SL.TZ0.3", "topics": [ "topic-3-content" ], "subtopics": [ "3-5-media", "3-4-networks-and-the-internet", "3-1-data" ] }, { "Question": "
\n

RESOURCE BOOKLET: Implanted microchips

\n

Source A: Graphic

\n

\n


Source B: Series of message posts
Posts from award-winning tech influencer and blogger @richtech

\n

\n


Source C: Article – Bans on microchipping employees

\n

Many countries are passing laws that prohibit companies from requiring employees to have a device such as microchip or radio frequency identification device (RFID) tag implanted into their bodies as a condition of employment.

\n

Employees can still be microchipped if they volunteer to do so. Tech4All, a technology company, has microchipped more than 50 of its employees. The company claims the microchips help people to open building doors, access their computers, and pay for items in the company restaurant.

\n

It takes 40–60 days for the chip to settle under the skin. During this period, it can itch, and scratching is discouraged as it could dislodge the chip. The chips are relatively durable and will handle most bumps, but extreme pressure has been known to shatter them. The chips do not heat up or explode when anywhere near airport security scanners, but they may fail after a magnetic resonance imaging (MRI) scan.

\n


Source D

\n

Biohacking is the next stage in human evolution. Biohackers can optimize their bodies with a combination of gadgets, microchip implants, diets, or anything else they can put into their body to make it work better. The use of microchip implants is also an extension of the concept of the Internet of Things (IoT). By 2030, it is estimated that there will be more than 75 billion connected devices.

\n

Microchips have been used in pets as form of identification to quickly reunite owners with lost or injured pets. Now, microchipping is being considered for the tracking of individuals like the elderly, those with memory loss, and prisoners.

\n

Supporters of microchip implants say they are safe and can be protected from being hacked. However, there are privacy concerns about the data transmitted from or stored on the microchip. These concerns go beyond those associated with location tracking.

\n
\n

In Source A, employees are using an embedded microchip to gain access to the building.

\n

Identify two digital systems, in addition to implanted microchips, that an employee could use to gain access to a building in Source A.

\n
", "Markscheme": "
\n

Answers may include:

\n\n


Award [1] for identifying each alternative digital system an employee could use to gain access to a building up to [2] marks. Do not accept implanted microchips.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "19M.2.SL.TZ0.1", "topics": [ "topic-3-content" ], "subtopics": [ "3-4-networks-and-the-internet" ] }, { "Question": "
\n

Students should be provided with the pre-release document ahead of the May 2019 HL paper 3 examination, this can be found under the \"Your tests\" tab > supplemental materials > May 2019 HL paper 3 pre-release document: AV.

\n

 

\n

Mobility challenges for the elderly, young, disadvantaged, and handicapped.

\n


Source 1: Miketon

\n

Miketon is a small town with a population of 5000. It has one taxi company with two drivers who are about to retire. There are no plans for the taxi company to continue. The town council is aware that this will create problems for the elderly citizens who live in the community. The council predicts that this problem will grow, as there are increasing numbers of elderly people retiring to the area.

\n

Miketon is 20 km from the regional centre, Towbro, which has a population of 300 000. As a result of this closeness, it is also popular with young families, as it is within commuting* distance (see Figure 1).

\n

Figure 1: Map showing the locations of Miketon and Towbro

\n

\n

The loss of the taxi service and an infrequent bus service to Towbro will create problems for both the elderly, who need access to the hospital, and for teenagers who wish to attend cultural and sporting events in Towbro.

\n
\n

* Commuting: to travel some distance between one's home and place of work on a regular basis.

\n

 

\n

Source 2: Miketon Town Council

\n

Miketon Town Council wants to solve this problem and has two suggestions they will put forward at the next council meeting.

\n
    \n
  1. A fleet of autonomous vehicles is purchased by the council that could be used by anyone in the town at a subsidized rate. All bookings would be made through the council website or the council transport app. The autonomous vehicles would easily cover the distances between the regional centre and other locations.
  2. \n
  3. A ride-share company is invited to start operations in Miketon. To entice companies and local drivers to participate, the council would subsidize the trips by paying a surcharge (an amount added to the fare), which would be credited to the ride-share drivers and company.
  4. \n
\n

Both suggestions have advantages as well as limitations.

\n

 

\n

Source 3: Readiness for autonomous vehicles

\n

Each country can be graded using criteria that determine how ready it is for autonomous vehicles. The grade can be either very ready, ready, or not ready. Four of the criteria used to determine the readiness of the country in which Miketon is located are shown in Figure 2.

\n

Figure 2: Criteria and scores for the country in which Miketon is located

\n

\n

 

\n

Source 4: A pilot study of a ride-sharing scheme called Rideshare

\n

The findings of the Rideshare pilot scheme (see Figure 3), show that by carefully designing the integration of ride sharing with public transport services, the ride-sharing scheme can be successful to a significant extent.

\n

Figure 3 Rideshare board

\n

\n

Three features of the Rideshare pilot scheme were:

\n
    \n
  1. It was developed and implemented with the support of the local council and citizens.
  2. \n
  3. Ride-sharing notice boards with information about the services were placed at local bus stops and in railway stations to promote the use of these services in an integrated way.
  4. \n
  5. The pricing strategy ensured that ride sharing was so expensive that it deterred people from using it and not too cheap that it stopped people using public transport.
  6. \n
\n
\n

It was recently reported that an autonomous vehicle had collided with an elderly person in a wheelchair that had rolled into the road. The autonomous vehicle chose to run over the wheelchair rather than avoid it, as swerving would have put two children at risk. This incident led to a discussion in the council about the ethical decision-making process used by the autonomous vehicle.

\n

Discuss who should be accountable for an accident in the town involving an autonomous vehicle.

\n
", "Markscheme": "
\n

Answers may include:

\n


Possible stakeholders include: car manufacturers, the council that purchased the vehicles and controls its use, the elderly person, and the two children and their parents.

\n


For the car manufacturer to be accountable:

\n\n


For the council to be accountable:

\n\n


For the elderly person to be accountable:

\n\n


For the children and their parents to be accountable:

\n\n

 

\n

Note to examiners: When discussing who is accountable, a range of stakeholders need to be considered with a balance of reasons why they might be accountable as opposed to a different stakeholder. A minimum of three stakeholders would be expected for the higher markbands.

\n

Keywords: change, power, systems, ethics, values, autonomous, policies, laws, regulations, reliability.

\n

 

\n

Please refer to the HL paper 3 question 3 markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n

 

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "19M.3.HL.TZ0.3", "topics": [ "topic-5-hl-extension" ], "subtopics": [ "5-3-sustainable-development" ] }, { "Question": "
\n

Students should be provided with the pre-release document ahead of the May 2019 HL paper 3 examination, this can be found under the \"Your tests\" tab > supplemental materials > May 2019 HL paper 3 pre-release document: AV.

\n

 

\n

Mobility challenges for the elderly, young, disadvantaged, and handicapped.

\n


Source 1: Miketon

\n

Miketon is a small town with a population of 5000. It has one taxi company with two drivers who are about to retire. There are no plans for the taxi company to continue. The town council is aware that this will create problems for the elderly citizens who live in the community. The council predicts that this problem will grow, as there are increasing numbers of elderly people retiring to the area.

\n

Miketon is 20 km from the regional centre, Towbro, which has a population of 300 000. As a result of this closeness, it is also popular with young families, as it is within commuting* distance (see Figure 1).

\n

Figure 1: Map showing the locations of Miketon and Towbro

\n

\n

The loss of the taxi service and an infrequent bus service to Towbro will create problems for both the elderly, who need access to the hospital, and for teenagers who wish to attend cultural and sporting events in Towbro.

\n
\n

* Commuting: to travel some distance between one's home and place of work on a regular basis.

\n

 

\n

Source 2: Miketon Town Council

\n

Miketon Town Council wants to solve this problem and has two suggestions they will put forward at the next council meeting.

\n
    \n
  1. A fleet of autonomous vehicles is purchased by the council that could be used by anyone in the town at a subsidized rate. All bookings would be made through the council website or the council transport app. The autonomous vehicles would easily cover the distances between the regional centre and other locations.
  2. \n
  3. A ride-share company is invited to start operations in Miketon. To entice companies and local drivers to participate, the council would subsidize the trips by paying a surcharge (an amount added to the fare), which would be credited to the ride-share drivers and company.
  4. \n
\n

Both suggestions have advantages as well as limitations.

\n

 

\n

Source 3: Readiness for autonomous vehicles

\n

Each country can be graded using criteria that determine how ready it is for autonomous vehicles. The grade can be either very ready, ready, or not ready. Four of the criteria used to determine the readiness of the country in which Miketon is located are shown in Figure 2.

\n

Figure 2: Criteria and scores for the country in which Miketon is located

\n

\n

 

\n

Source 4: A pilot study of a ride-sharing scheme called Rideshare

\n

The findings of the Rideshare pilot scheme (see Figure 3), show that by carefully designing the integration of ride sharing with public transport services, the ride-sharing scheme can be successful to a significant extent.

\n

Figure 3 Rideshare board

\n

\n

Three features of the Rideshare pilot scheme were:

\n
    \n
  1. It was developed and implemented with the support of the local council and citizens.
  2. \n
  3. Ride-sharing notice boards with information about the services were placed at local bus stops and in railway stations to promote the use of these services in an integrated way.
  4. \n
  5. The pricing strategy ensured that ride sharing was so expensive that it deterred people from using it and not too cheap that it stopped people using public transport.
  6. \n
\n
\n

With reference to the stimulus material above and to your own inquiries, recommend the digital intervention(s) that the council should choose to address the challenge of ensuring mobility associated with living in towns such as Miketon.

\n
", "Markscheme": "
\n

The candidate must evaluate both interventions using the criteria in the guide and the information from the sources to support the recommendation made.

\n


Answers may include:

\n

Evaluation of the use of autonomous vehicles  

\n

Equity:

\n\n

Acceptability:

\n\n

Cost:

\n\n

Feasibility:

\n\n

Innovation: 

\n\n

Ethics:

\n\n

 

\n

Evaluation of a ride-sharing scheme  

\n

Equity:

\n\n

Acceptability:

\n\n

Cost:

\n\n

Feasibility:

\n\n

Innovation:

\n\n

Ethics:

\n\n

 

\n

The recommendation:

\n\n

 

\n

Keywords: change, power, systems, values, ethics, data, privacy, policies, app, trust, automation, reliability, accessibility, regulations, laws, access, inclusion, infrastructure, equity, acceptability, cost, feasibility, innovations,  technological determinism.

\n

 

\n

Please refer to the HL paper 3 question 4 markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "19M.3.HL.TZ0.4", "topics": [ "topic-2-concepts" ], "subtopics": [ "2-1-change" ] }, { "Question": "
\n

Braille keyboards

\n

According to the World Health Organization, over 250 million people worldwide are blind or visually impaired. Many of them use a writing system called Braille, which they read by touching patterns of raised dots with their fingertips.

\n

Several companies have recently developed Braille keyboards, such as the one shown in Figure 1. Braille keyboards use different combinations of the nine main keys to form characters.

\n

Figure 1: A Braille keyboard

\n

\n


Braille keyboards are usually very expensive. They can cost twenty or thirty times more than standard keyboards. They are always protected by patents and cannot be cheaply reproduced.

\n

Umair Osman, a young teacher in Pakistan, has invented a haptic interface that uses a flexible plastic overlay1 to imitate the layout of a Braille keyboard.

\n

Umair has also developed software that converts the combinations of keys pressed on the overlay to the corresponding ASCII2 character. The overlay, together with the software, enables visually impaired students to convert a standard keyboard into a Braille keyboard.

\n

Umair is considering releasing his software as open-source software and using crowdfunding3 to develop the Braille keyboard further.

\n

 

\n
\n

1  overlay: a flexible plastic cover that is placed over the keyboard to allow combinations of keys to be pressed by the user

\n

2  ASCII: American Standard Code for Information Interchange

\n

3  crowdfunding: funding projects from donations made by a large number of people via the internet

\n
\n

Identify two characteristics of a haptic interface.

\n
[2]
\n
a.i.
\n
\n

Identify two ways how Umair could have represented the algorithms prior to writing his software code.

\n
[2]
\n
a.ii.
\n
\n

Outline one reason why Umair used these representations of the algorithms prior to writing the software code.

\n
[2]
\n
a.iii.
\n
\n

Explain why Umair used surveys, interviews and observation to gather information from visually impaired people during the development of his system.

\n
[6]
\n
b.
\n
\n

Umair has decided on a strategy to develop his software and Braille keyboard by using crowdfunding and open-source software.

\n

Discuss the advantages and disadvantages of this strategy.

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n


Award [1] for each definition, up to a maximum of [2].

\n
a.i.
\n
\n

Answers may include:

\n\n


Award [1] for identifying each representation, up to a maximum of [2].

\n
a.ii.
\n
\n

Answers may include:

\n\n


Award [1] for identifying a reason
why Umair used these representations of the algorithms prior to writing the software code and [1] for a development of that reason up to a maximum of [2].

\n
a.iii.
\n
\n

Answers may include:

\n

Surveys

\n\n

Interviews

\n\n

Observation

\n\n

 

\n

Award [1] for identifying a reason why each method of gathering information was used and [1] for a development of that reason up to a maximum of [2].

\n

Mark as [2] + [2] + [2].

\n
b.
\n
\n

Answers may include:

\n

Advantages

\n\n


Disadvantages

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: innovation, trust, collaboration, digital divide, software applications, open source, algorithms, change, expression, identity, ethics, values

\n


Refer to SL/ HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document
.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "19M.1.SL.TZ0.1", "topics": [ "topic-3-content", "topic-1-introduction" ], "subtopics": [ "3-3-computers", "3-2-algorithms", "3-1-data", "1-1-what-is-digital-society" ] }, { "Question": "
\n

Fake news

\n

We see and hear news every day and trust that the information provided is accurate. That belief may soon end.

\n

Artificial intelligence (AI) software is now being developed that can produce fake video footage of public figures using recordings of their own voices. Using as little as one minute of user-generated content (data), it can reproduce a particular person’s voice. The developer of this software demonstrated the results by using the voices of Bill Clinton, George Bush and Barack Obama in a computer-generated conversation.

\n

Once a person’s voice has been reproduced, a fake video can be created by processing hundreds of videos of the person’s face. Video footage of politicians are often used, as there is so much data available online.

\n

Law professor John Silverman commented that, as humans we tend to believe what we see, and the increased number of tools to make fake media that is unrecognizable from real media is going to prove a major challenge in the future.

\n

Discuss the claim that companies who develop software that can create fake videos of politicians should be accountable for the fake videos posted by users of their software on social media platforms.

\n
", "Markscheme": "
\n

Answers may include:

\n

Software companies should be accountable (claim)

\n\n

Software companies should not be accountable (counter-claim) 

\n\n

 

\n

In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: politics, political speech, lobbying, machine learning, speech recognition, image analysis, deepfakes, media authenticity, synthetic digital media, monitoring, accountability, responsibility, change, expression, power, values, ethics

\n

 

\n

Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "21M.1.HL.TZ0.6", "topics": [ "topic-2-concepts" ], "subtopics": [ "2-1-change" ] }, { "Question": "
\n

RESOURCE BOOKLET: Implanted microchips

\n

Source A: Graphic

\n

\n


Source B: Series of message posts
Posts from award-winning tech influencer and blogger @richtech

\n

\n


Source C: Article – Bans on microchipping employees

\n

Many countries are passing laws that prohibit companies from requiring employees to have a device such as microchip or radio frequency identification device (RFID) tag implanted into their bodies as a condition of employment.

\n

Employees can still be microchipped if they volunteer to do so. Tech4All, a technology company, has microchipped more than 50 of its employees. The company claims the microchips help people to open building doors, access their computers, and pay for items in the company restaurant.

\n

It takes 40–60 days for the chip to settle under the skin. During this period, it can itch, and scratching is discouraged as it could dislodge the chip. The chips are relatively durable and will handle most bumps, but extreme pressure has been known to shatter them. The chips do not heat up or explode when anywhere near airport security scanners, but they may fail after a magnetic resonance imaging (MRI) scan.

\n


Source D

\n

Biohacking is the next stage in human evolution. Biohackers can optimize their bodies with a combination of gadgets, microchip implants, diets, or anything else they can put into their body to make it work better. The use of microchip implants is also an extension of the concept of the Internet of Things (IoT). By 2030, it is estimated that there will be more than 75 billion connected devices.

\n

Microchips have been used in pets as form of identification to quickly reunite owners with lost or injured pets. Now, microchipping is being considered for the tracking of individuals like the elderly, those with memory loss, and prisoners.

\n

Supporters of microchip implants say they are safe and can be protected from being hacked. However, there are privacy concerns about the data transmitted from or stored on the microchip. These concerns go beyond those associated with location tracking.

\n
\n

With reference to Source B, suggest one way how technology companies use influencers to promote their products.

\n
[2]
\n
a.
\n
\n

With reference to Source B, suggest one reason why technology companies work with influencers to promote their products.

\n
[2]
\n
b.
\n
", "Markscheme": "
\n

Answers may include:

\n\n


Award [1] for way how technology companies use influencers to promote their products and [1] for a development of that reason up to [2] marks.

\n
a.
\n
\n

Answers may include:

\n\n


Award [1] for one reason why technology companies work with influencers to promote their products and [1] for the development of that reason up to [2] marks.

\n
b.
\n
", "Examiners report": "
\n[N/A]\n
a.
\n
\n[N/A]\n
b.
\n
", "question_id": "19M.2.SL.TZ0.2", "topics": [ "topic-4-contexts" ], "subtopics": [ "4-1-cultural" ] }, { "Question": "
\n

Your personal avatar

\n

SBE Cruise Lines is implementing new IT systems using artificial intelligence (AI) to enhance passenger experiences. Recently, the company equipped its ships with touch screens where passengers can interact with their own customizable 3D avatar. Passengers wear a bracelet on their wrist, and their 3D avatar appears on touch screens as they walk around the ship (see Figure 5).

\n

Figure 5: A passenger interacting with the avatar

\n

\n

The bracelet tracks a passenger’s location on the ship using thousands of sensors, and this data is constantly synchronized with that passenger’s data stored in the cloud. This may include their photo, room number or passport information.

\n

To improve the passenger experience, the avatar developers update the IT systems on the cruise ship every night. To ensure that the IT updates are completed, George Smith, the project manager, must communicate with a number of stakeholders.

\n

George believes that, to make the best improvements, the avatar developers should observe the passengers’ real-time interactions with the system.

\n
\n

Identify two stakeholders that George, the project manager, must consult before implementing the IT updates.

\n
[2]
\n
a.i.
\n
\n

Identify two sensors that the passenger’s bracelet may use.

\n
[2]
\n
a.ii.
\n
\n

Identify two types of machine learning used by artificial intelligence (AI) systems.

\n
[2]
\n
a.iii.
\n
\n

Explain why the avatar developers would create avatars that do not look like humans.

\n
[3]
\n
b.i.
\n
\n

Explain why George believes the avatar developers should observe the passengers’ real-time interactions with the system.

\n
[3]
\n
b.ii.
\n
\n

Matt Earle, the CEO of SBE Cruise Lines, has been investigating using artificial intelligence (AI) systems to track passengers and suggest activities they may wish to take part in when they interact with the touch screens on the ship. Some of his colleagues have concerns about taking this approach.

\n

To what extent should Matt rely on the recommendations from the AI system to suggest activities to passengers?

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each stakeholder up to [2 max].

\n
a.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each sensor, up to a maximum of [2].

\n
a.ii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each type of machine learning, up to a maximum of [2].

\n
a.iii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying a reason why the avatar developers would create the avatars so they do not look like humans and [1] for each subsequent development of that reason up to a maximum of [3].

\n
b.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying a reason why the avatar developers should observe the passengers' real-time interactions with the system and [1] for each subsequent development of that reason up to a maximum of [3].

\n
b.ii.
\n
\n

Answers may include:

\n

 Reasons why Matt should rely on the recommendations from the AI system:

\n\n

Reasons why Matt should not rely on the recommendations from the AI system: 

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: leisure, data, trust, judgement, values, ethics, anonymity, privacy, monitoring, algorithm, change, systems, power

\n


Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.i.
\n
\n[N/A]\n
b.ii.
\n
\n[N/A]\n
c.
\n
", "question_id": "20N.1.SL.TZ0.4", "topics": [ "topic-3-content", "topic-4-contexts", "topic-2-concepts" ], "subtopics": [ "3-3-computers", "3-1-data", "3-6-artificial-intelligence", "3-5-media", "4-1-cultural", "2-1-change" ] }, { "Question": "
\n

Pepper

\n

Pepper is a social robot that uses natural language processing, as well as voice recognition, to understand what is being said. Pepper can also identify basic human emotions by analysing verbal and non-verbal clues (see Figure 1).

\n

Figure 1: Pepper the social robot

\n

\n

[Source: Wikipedia, 2019. Pepper (robot). [image] Available at:
https://en.wikipedia.org/wiki/Pepper_(robot). Accessed 21 March 2019.]

\n

Pepper has multiple sensors and a battery that lasts for 12 hours and is equipped with wireless connectivity. Pepper is released in batches of a thousand, and they usually sell out immediately.

\n

Software developers can create new apps for Pepper, as the robot has a generic profile. So far, Pepper has been successfully used on cruise ships, in homes in Japan, and with the elderly in the United Kingdom. However, Pepper could not answer questions from customers in supermarkets in some parts of the USA and Latin America.

\n
\n

Pepper uses machine learning to improve its natural language processing.

\n
\n

In addition to a voice sensor, identify two sensors that would be found in Pepper.

\n
[2]
\n
a.i.
\n
\n

Outline two reasons why Pepper could not answer a customer’s question in a supermarket.

\n
[4]
\n
a.ii.
\n
\n

Identify two advantages of using unsupervised learning to enable Pepper to improve its natural language processing. 

\n
[2]
\n
b.i.
\n
\n

Identify two disadvantages of using unsupervised learning to enable Pepper to improve its natural language processing.

\n
[2]
\n
b.ii.
\n
\n

Pepper is released in batches of a thousand, and they usually sell out immediately.

\n

Explain one reason why Pepper is only released in relatively small batches.

\n
[2]
\n
b.iii.
\n
\n

King Robotics is planning to use social robots in schools. The robots will use a unique approach called care receiving. In this approach to teaching, the robot does not directly instruct the student; instead, the robot makes mistakes and asks the student for help to correct them. Early studies have found that children respond very positively to this approach. The robots will also be able to carry out direct teaching activities.

\n

Evaluate the advantages and disadvantages of using social robots such as Pepper to support the care-receiving teaching approach as well as carry out direct teaching activities.

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n

Award [1] for each sensor identified up to [3] marks.

\n
a.i.
\n
\n

Answers may include:

\n\n\n\n

 

\n

Award [1] for each reason why Pepper could not answer a customer’s question in a supermarket and [1] for a development of that reason up to maximum of [2] marks.

\n
a.ii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for each advantage of using unsupervised learning identified up to [2] max.

\n
b.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for each disadvantage of using unsupervised learning identified up to [2] max.

\n
b.ii.
\n
\n

Answers may include:

\n\n\n

 

\n

Award [1] for identifying a reason why Pepper is released in small batches and [1] for a development of that reason up to [2] max.

\n
b.iii.
\n
\n

Answers may include:

\n

Advantages:

\n\n

Disadvantages:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: innovation, learning, pedagogy, robot, social robot, autonomous, evolution, trust, automation, change, expression, identity, systems, values

\n

 

\n

Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
b.i.
\n
\n[N/A]\n
b.ii.
\n
\n[N/A]\n
b.iii.
\n
\n[N/A]\n
c.
\n
", "question_id": "21M.1.SL.TZ0.4", "topics": [ "topic-3-content", "topic-2-concepts" ], "subtopics": [ "3-3-computers", "3-6-artificial-intelligence", "2-1-change" ] }, { "Question": "
\n

Biometric authorization

\n

Bright Creativa is an advertising company with approximately 100 employees, all of whom work in their head office in Seattle, USA. The company has decided to introduce a biometric authorization system using fingerprint scanners (see Figure 1). This enables the employees to gain access to the company’s resources, such as entering the building, logging on to the company network and even purchasing items from the company café.

\n

Figure 1: An employee using biometric authorization to access the office at Bright Creativa

\n

\n

[Source: adapted image (recoloured) “Fingerprint scanner in Tel Aviv” by David Shankbone (https://commons.wikimedia.org/).
Under copyright and creative commons licence 3.0 (https://creativecommons.org/licenses/by/3.0/).]

\n

The authorization system is linked to the company database. The employee’s identification number (employee ID) is the primary key field in the Employee table, which stores their personal details. The company database includes other tables that store data on when they access the building, the frequency that they log on to the network and the items they purchase from the café. Some employees are concerned about the increased level of surveillance within the company, but the company has reassured these employees that a privacy policy has been developed. 

\n
\n

Identify two other forms of biometric data Bright Creativa could collect.

\n
[2]
\n
a.i.
\n
\n

Identify two characteristics of a relational database.

\n
[2]
\n
a.ii.
\n
\n

Identify two methods that could be used to ensure that the data input to the database is accurate.

\n
[2]
\n
a.iii.
\n
\n

As part of the implementation of the biometric authorization system, Bright Creativa has written a privacy policy.  

\n

Explain three features that Bright Creativa would need to include in a privacy policy linked to the company’s biometric authorization system.

\n
[6]
\n
b.
\n
\n

To what extent are the benefits of employees’ improved access to company resources outweighed by their concerns about the level of surveillance by the company?

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each other form of biometric data up to maximum of [2].

\n
a.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each characteristic of a relational database up to maximum of [2].

\n
a.ii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each method that can be used to ensure the data added into the database is accurate up to maximum of [2].

\n
a.iii.
\n
\n

Answers may include:

\n\n\n\n\n

 

\n

Award [1] for identifying a feature that Bright Creativa would need to include in a privacy policy and [1] for explaining why that feature should be included up to a maximum of [2].

\n

Mark as [2] + [2] + [2].

\n
b.
\n
\n

Answers may include:

\n

Advantages to the employee:

\n\n

Concerns of the employee:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: economic, security, privacy, monitoring, surveillance, access, productivity, trust, transparency, change, power, systems, values, ethics

\n

 

\n

Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "19N.1.SL.TZ0.1", "topics": [ "topic-3-content", "topic-2-concepts" ], "subtopics": [ "3-1-data", "2-1-change" ] }, { "Question": "
\n

Google’s DeepMind uses a machine learning algorithm and neural network to analyse data. Google is now collaborating with the United Kingdom’s National Health Service (NHS) to develop systems that can improve the quality of health care.

\n

Its first project is to create a system that can analyse digital scans of eyes and thus help doctors diagnose sight-destroying diseases in time for them to be treated. This is a complex problem for pattern recognition.

\n

Google needs large quantities of retinal scans to test the algorithm. Moorfields Eye Hospital in London has the largest collection of retinal scans in the world and will share them with Google for free. The scans will be anonymized. Patients can opt out of sharing their data by emailing an NHS data protection officer. Google will use the knowledge gained from this project to help create future software that can eventually be marketed to health care providers.  

\n

For this project, Google needs to consider the needs and concerns of multiple stakeholders, including patients, doctors, and the NHS. Google plans to hold four patient forums a year and set up a panel of independent reviewers to oversee what the company is doing. Ultimately, Google hopes to make a profit from this technology.

\n
\n

Identify two characteristics of an algorithm.

\n
[2]
\n
a.i.
\n
\n

Identify two characteristics of pattern recognition.

\n
[2]
\n
a.ii.
\n
\n

Google may use a range of representations of the algorithms during their development.

\n

Identify two ways how these algorithms may be represented.

\n
[2]
\n
a.iii.
\n
\n

Google will collect large quantities of data that will be held in data centres.

\n

Explain two concerns linked to the increasing number of data centres.

\n
[4]
\n
b.i.
\n
\n

Explain one advantage of using deep learning instead of traditional machine learning techniques.

\n
[2]
\n
b.ii.
\n
\n

It is claimed that the NHS’s partnership with Google is beneficial for both stakeholders. However, concerns have been raised about the ethical implications of this data-sharing agreement.

\n

To what extent is it ethical for the NHS to share patient information about eye scans from Moorfields Eye Hospital with Google?

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n


Award [1] mark for each of the characteristics identified above up to a maximum of [2] marks.

\n
a.i.
\n
\n

Answers may include:

\n\n


Award [1] mark for each of the characteristics identified above up to a maximum of [2] marks.

\n
a.ii.
\n
\n

Answers may include:

\n\n


Award [1] mark for each of the representations identified up to a maximum of [2] marks.

\n
a.iii.
\n
\n

Answers may include:

\n\n\n


Award [1] for identifying a concern linked to the use of data centres and an additional [1] for the explanation of that concern up to a maximum of [2] marks.

\n

Mark as [2] + [2].

\n
b.i.
\n
\n

Answers may include:

\n\n


Award [1] for identifying an advantage of using deep learning and an additional [1] for the explanation of that advantage up to a maximum of [2] marks.

\n
b.ii.
\n
\n

Answers may include:

\n

Ethical problems:

\n\n

Benefits for the NHS and its patients:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: health, medical care, medical diagnostics, data, privacy, anonymity, algorithm, change, power, systems, values

\n

 

\n

Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.i.
\n
\n[N/A]\n
b.ii.
\n
\n[N/A]\n
c.
\n
", "question_id": "18M.1.SL.TZ0.3", "topics": [ "topic-3-content", "topic-2-concepts" ], "subtopics": [ "3-2-algorithms", "3-6-artificial-intelligence", "3-1-data", "2-1-change" ] }, { "Question": "
\n

Clouds under the sea

\n

Microsoft has located one of its data centres on the seabed. Project Natick is now operating 100 feet below the surface of the North Sea (see Figure 4).

\n

Figure 4: An artist’s representation of a data centre on the sea bed

\n

\n

[Adapted under sea photo by NOAA on Unsplash]

\n

Microsoft has chosen to develop data centres on the seabed because they claim there are concerns about the environmental impact of data centres built on land. These seabed data centres can be constructed and placed on the sea bed in 90 days. This is compared to the two years that are required for land-based data centres.

\n

Google patented their design for an underwater data centre in 2009. Even though functioning prototypes have been trialled, none have been used commercially.

\n

The demand for data storage is doubling every two years, so it is likely that an increasing number of data centres will need to be constructed. These data centres can be constructed either under the sea or on land.

\n

Discuss whether companies like Microsoft should build data centres on the seabed.

\n
", "Markscheme": "
\n

Answers may include:

\n

Reasons why Microsoft should build data centres on the seabed (claim):

\n\n

Reasons why Microsoft should not build data centres on the seabed (counter-claim):

\n\n


In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: environment, pollution, e-waste, reliability, connectivity, storage, maintenance, cloud, change, systems, values, cost, feasibility, acceptability

\n


Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "20N.1.HL.TZ0.5", "topics": [ "topic-3-content" ], "subtopics": [ "3-1-data" ] }, { "Question": "
\n

Accessing online media

\n

Rajesh frequently travels for his job and has found that he is unable to watch his favourite films and television (TV) channels when abroad (see Figure 1). He has been informed that he can subscribe to an internet protocol television (IPTV) service or use a virtual private network (VPN) to stream or download this content.

\n

Figure 1: An example of blocked content

\n

\n
\n

Identify two hardware devices that Rajesh could use to view his internet protocol television (IPTV) channels.

\n
[2]
\n
a.i.
\n
\n

Identify two features of a virtual private network (VPN).

\n
[2]
\n
a.ii.
\n
\n

Identify two features of a protocol.

\n
[2]
\n
a.iii.
\n
\n

Explain why Rajesh downloaded films rather than streaming them when he was travelling.

\n
[4]
\n
b.i.
\n
\n

Rajesh has been told that subscribing to an internet protocol television (IPTV) service may compromise his anonymity.

\n

Distinguish between anonymity and privacy.

\n
[2]
\n
b.ii.
\n
\n

To what extent is it acceptable for Rajesh to use services like a virtual private network (VPN) to access content that may be blocked in the country he is visiting?

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n


Award [1] for each hardware device identified that Rajesh could use to view his IPTV channels up to [2].

\n

Do not accept monitor or television.

\n
a.i.
\n
\n

Answers may include:

\n\n


Award [1] for each feature of a VPN identified up to [2].

\n
a.ii.
\n
\n

Answers may include:

\n\n


Award [1] for each feature of a protocol identified up to [2].

\n
a.iii.
\n
\n

Answers may include:

\n\n



\n
b.i.
\n
\n

Answers may include:

\n\n


Award [1] for each appropriate statement that distinguishes anonymity from privacy up to [2].

\n
b.ii.
\n
\n

Answers may include:

\n

Reasons why Rajesh should use services like a VPN:

\n\n

Reasons why Rajesh should not use services like a VPN:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: employment, VPN, censorship, surveillance, anonymity, privacy, laws, regulations, change, power, systems, values, ethics

\n


Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.i.
\n
\n[N/A]\n
b.ii.
\n
\n[N/A]\n
c.
\n
", "question_id": "21N.1.SL.TZ0.1", "topics": [ "topic-3-content", "topic-2-concepts" ], "subtopics": [ "3-3-computers", "3-4-networks-and-the-internet", "3-1-data", "3-5-media", "2-1-change" ] }, { "Question": "
\n

A cashless society

\n

In the near future, it is possible that cash will not be accepted as a means of payment in Sweden. People are already using alternative ways of paying, such as mobile payment, card payment and internet payment. Currently, over 95% of citizens in Sweden have internet access.

\n

Many people in Sweden claim there are advantages of using an app developed by Swish. The Swish app allows friends to share a restaurant bill, pay where credit or debit cards are not accepted, for babysitting or parking tickets, or make a donation at church.

\n

However, other people in Sweden claim that making the Swish app the only means of payment may increase inequalities within the country.

\n

Discuss whether countries should pass legislation making apps such as Swish the only means of payment.

\n
", "Markscheme": "
\n

Answers may include:

\n

Benefits of apps such as Swish being the only form of payment (claim)

\n\n

Disadvantages of apps such as Swish being the only form of payment (counter-claim)

\n\n

 

\n

Accept implicit and explicit references to apps such as the Swish app.

\n

In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: business, families, digital divide, access, inclusion, acceptability, feasibility, equity, digitalization, anonymity, privacy, change, power, systems, values, ethics

\n

 

\n

Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "21M.1.HL.TZ0.5", "topics": [ "topic-1-introduction" ], "subtopics": [ "1-1-what-is-digital-society" ] }, { "Question": "
\n

Students should be provided with the pre-release document ahead of the May 2018 HL paper 3 examination, this can be found under the \"Your tests\" tab > supplemental materials > May 2018 HL paper 3 pre-release document: Accessibility.

\n

 

\n

Improving the accessibility to the curriculum for children with special educational needs and disabilities (SEND)

\n

 

\n

Source 1: Tayton School

\n

Tayton School is a primary school that teaches 500 children aged between 5 and 12. There are three classes in each year group, with a maximum of 24 students in each class. The school’s motto is “Education for Everyone”, and inclusion is at the heart of the school’s mission.

\n

The school’s Inclusion Department consists of five full-time staff, led by Sandra, and 10 learning support assistants who are active in working with the children. Sandra has recently produced a report on the students with special educational needs and disabilities (SEND) in the school, in which she found that the increasing numbers of students, and the types of SEND, means that the schools needs to invest in expanding the amount of support for the students (see Table 1).

\n

Table 1: SEND at Tayton School

\n

\n

Sandra’s report argues that, next year, the work of the Inclusion Department would be more effective if the school purchased educational digital technologies, such as social robots and assistive technologies.

\n

 

\n

Source 2: Social robots in education

\n

Sandra researched social robots and came back to the department meeting with this information:

\n

In 2020, a report on the use of social robots in education was published by a prestigious university professor, who concluded that social robots have the potential to be a key player in education in the way textbooks and whiteboards have been in the past. A social robot has the potential to support students in ways that could never have been envisaged 20 years ago. However, there are significant technical limitations, particularly linked to the social robot’s ability to interact with students, that will restrict their usability for the next few years

\n

 

\n

Source 3: Mary sees the positives

\n

Mary, one of the learning assistants at Tayton School, says:

\n

“As a parent of two school-age children, I think the potential introduction of social robots has both advantages and disadvantages. My children thought the idea of having a robot that sits with them very exciting, and I think they would do what the robot asks without questioning it. The robot will also be much more patient while they are learning their times tables!” (See Figure 1).

\n

Figure 1: Students interacting with a social robot

\n

\n

[Source: pexels.com]

\n

 

\n

Source 4: James has doubts

\n

James, another learning assistant at Tayton School, is wary of the overuse of digital technology in schools for children with special needs based on his experiences in other schools. He has found some research that supports his ideas.

\n

\n

[Source: pexels.com]

\n
\n

With reference to the stimulus material and your own inquiries, recommend whether Tayton School should use social robots and/or assistive technologies to ensure students with SEND can be further integrated into the school.

\n
", "Markscheme": "
\n

Answers may include:

\n


Evaluation of social robots

\n

Equity:

\n\n

Acceptability:

\n\n

Cost:

\n\n

Feasibility:

\n\n

Innovation:

\n\n

Ethics:

\n\n

 

\n

Evaluation of assistive technology

\n

Equity:

\n\n

Acceptability:

\n\n

Cost:

\n\n

Feasibility:

\n\n

Innovation:

\n\n

Ethics:

\n\n


The recommendation:

\n\n

 

\n

Keywords: identity, ethics, systems, values, data, privacy, policies, app, facial recognition, trust, social robot, assistive technologies, hardware, automation, relationships, accessibility, access, inclusion, equity, acceptability, cost, feasibility, innovationstechnological determinism.

\n

 

\n

Please refer to the HL paper 3 question 4 markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "18M.3.HL.TZ0.4", "topics": [ "topic-2-concepts" ], "subtopics": [ "2-1-change" ] }, { "Question": "
\n

Using a Segway with machine learning capabilities?

\n

The Segway Patroller is a two-wheeled, battery-powered electric vehicle. Recently, Segway Patrollers have been used for security purposes in cities as well as in public spaces such as concerts, railway stations and shopping malls.

\n

The Segway Patroller can travel up to a speed of 20 kilometres per hour (about 12 miles per hour) and travel about 40 kilometres (25 miles) in distance before the battery needs to be recharged.

\n

Figure 3: A Segway Patroller

\n

\n

[Copyright: Urban Mobility GmbH – from https://en.wikipedia.org/wiki/File:Segway_Polizei_4.jpg]

\n


Each Segway Patroller can be customized by adding the following features.

\n\n

The managers at Oliverstadt Station claim the introduction of upgraded Segways that have a GPS navigation system and machine learning capabilities would lead to improvements in the customer service provided.

\n

Discuss whether the Segway Patrollers at Oliverstadt Station should be upgraded to include machine learning capabilities.

\n
", "Markscheme": "
\n

Answers may include:

\n

Reasons for upgrading the Segway Patrollers to include machine learning capabilities (claim):

\n\n

Reasons for not upgrading the Segway Patrollers to include machine learning capabilities (counter-claim):

\n\n

 

\n

In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: automation, connectivity, change, power, control, systems, values, ethics, machine learning, accountability, transparency, autonomy, surveillance, monitoring, algorithm, reliability, cost, feasibility

\n


Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "17N.1.HL.TZ0.5", "topics": [ "topic-5-hl-extension" ], "subtopics": [ "5-1-global-well-being" ] }, { "Question": "
\n

The human face of student counselling

\n

Many Diploma Programme (DP) coordinators are finding they do not have enough time to interview every student before they choose their DP subjects. They are considering purchasing the Student Counselling System, a proprietary management information system (MIS).

\n

The developers of the Student Counselling System claim that, if students complete online questionnaires to determine their interests, abilities and future goals, the system can give them very accurate results, resulting in less than 5% of students changing their diploma subjects. They also claim the Student Counselling System will allow DP coordinators to be able to interview every student, something they cannot do now.

\n

Some DP coordinators have concerns about the automation of this process and believe that advising students is something that is best done by relying on their own professional judgement and intuition.

\n

Discuss whether DP coordinators should rely on the recommendations of the Student Counselling System rather than their own professional judgement and intuition when advising students about what DP subjects to study.

\n
", "Markscheme": "
\n

Answers may include:

\n

Reasons why DP coordinators should rely on the recommendations of the Student Counselling System (claim):

\n\n

Reasons why DP coordinators should rely on their judgement (counter-claim):

\n\n

 

\n

In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.  

\n

Keywords: automation, change, power, systems, values, ethics, judgement, intuition, consistency, transparency, efficiency, algorithm, accuracy, reliability, equity, costs, feasibility

\n


Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "17N.1.HL.TZ0.6", "topics": [ "topic-5-hl-extension" ], "subtopics": [ "5-1-global-well-being" ] }, { "Question": "
\n

Medical centre budgets

\n

Dr Schultz is the head doctor and manager at the Okavango Medical Centre in the Republic of Botswana. This medical centre is located eight hours away from the capital city, Gaborone. The medical centre is able to cope with routine cases, but when the doctors at the centre encounter an unusual case, they have to communicate with specialists at the main hospital in Gaborone using either a cellphone or voice over internet protocol (VOIP).

\n

Currently, the Okavango Medical Centre does not have any medical equipment connected to the information technology (IT) systems at the hospital in Gaborone in real time. This makes it hard to give the necessary information to specialists in Gaborone when there are unexpected changes in a patient’s condition. Because of this, at times Dr Schultz has to ask a specialist doctor from Gaborone to visit the Okavango Medical Centre to carry out treatment.

\n

The area is becoming popular with tourists, and Dr Schultz is concerned that the doctors and nurses at the Okavango Medical Centre will be unable to treat the increasing number of patients. He believes Okavango Medical Centre needs better equipment in order to improve patient care.

\n

The IT staff at the Okavango Medical Centre created a database of the treatments carried out by the centre. Figure 1 shows an example of the form used to enter data.  

\n

Figure 1: Example of a form used to enter patient data 

\n

\n
\n

Identify two characteristics of voice over internet protocol (VOIP).

\n
[2]
\n
a.i.
\n
\n

Identify two reasons why staff at the Okavango Medical Centre would use a form to enter patient data into the database.

\n
[2]
\n
a.ii.
\n
\n

Outline one reason why the Okavango Medical Centre would use a relational database for the patients’ records.

\n
[2]
\n
a.iii.
\n
\n

Dr Schultz has arranged to speak to the local authority in an attempt to get more funding for the medical centre. He intends to use presentation software to create a multimedia presentation to support this speech. Dr Schultz is aware that many people in the audience are annoyed when slideshows are poorly designed.

\n

Explain three design errors Dr Schultz should avoid when creating his multimedia presentation slideshow for the local authority.

\n
[6]
\n
b.
\n
\n

The Okavango Medical Centre has received additional funding from the local authority. The centre is investigating the possibility of using these funds to purchase IT equipment that would allow surgeons in Gaborone to carry out surgery remotely.

\n

Evaluate the impact of the purchase of this IT equipment on the medical centre and its patients.

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n


Award [1] mark for identifying each characteristic of voice over internet protocol (VOIP) up to a maximum of [2] marks.

\n
a.i.
\n
\n

Answers may include:

\n\n


Award [1] mark for identifying each reason why staff at the Okavango Medical Centre would use a form to enter patient data into the database up to a maximum of [2] marks.

\n
a.ii.
\n
\n

Answers may include:

\n\n


Award [1] mark for identifying a reason why the Okavango Medical Centre would use a relational database and [1] mark for an explanation why it is a problem up to a maximum of [2] marks.

\n
a.iii.
\n
\n

Answers may include:

\n

Small font size

\n\n

Excessive/inappropriate transitions

\n\n

Too many slides

\n\n

Poor choice of colours

\n\n

Inappropriate language

\n\n

Inappropriate or overuse of multimedia

\n\n

Inconsistent formatting throughout the presentation

\n\n

 

\n

N.B.: The response requires an identification of a common design error followed by an explanation of why it is a problem. If no design error is mentioned but from the explanation it can be determined this should be credited.

\n

Award [1] mark for identifying a common design error and [1] mark for an explanation why it is a problem up to a maximum of [2] marks.

\n

Mark as [2] + [2] + [2].

\n
b.
\n
\n

Answers may include:

\n

Advantages of purchasing more IT equipment so that operations can be carried out remotely:

\n\n

Disadvantages of purchasing more IT equipment so that operations can be carried out remotely:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: health, medical care, training, trust, privacy, network, bandwidth, change, systems, values

\n


Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "18M.1.SL.TZ0.1", "topics": [ "topic-3-content", "topic-2-concepts" ], "subtopics": [ "3-4-networks-and-the-internet", "3-1-data", "2-1-change" ] }, { "Question": "
\n

Meet Dennis, the restaurant service robot

\n

Figure 3: Dennis, the restaurant robot             Figure 4: The user interface on Dennis        

\n

\n


SingBot Robotics
has developed a service robot called Dennis. A large restaurant chain, Gustavo’s, has recently purchased a number of Dennis robots to use as waiters for one of its restaurants in Singapore (see Figure 3).  

\n

Customers can give Dennis their orders in two ways:

\n\n

When the order is ready, Dennis collects it from the kitchen and brings it to the table. Customers can pay by swiping their credit card above Dennis’s card reader.

\n

The marketing manager at Gustavo’s has said that the robots improve the convenience and efficiency of the ordering process. She added, “In their feedback, customers tell us that Dennis makes their experience more memorable.”

\n

The managers at Gustavo’s are considering the introduction of Dennis robots in all their restaurants.  

\n
\n

Identify two sensors that Dennis needs in order to operate successfully in the restaurant.

\n
[2]
\n
a.i.
\n
\n

Identify two methods that the marketing manager at Gustavo’s could use to collect feedback from customers about Dennis.

\n
[2]
\n
a.ii.
\n
\n

Identify two characteristics of a social robot.

\n
[2]
\n
a.iii.
\n
\n

Customers speak to Dennis to give him their orders. Dennis uses natural language processing to understand what has been said to him.

\n

Explain three reasons why Dennis may not be able to understand what customers are saying to him.

\n
[6]
\n
b.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

Award [1] for identifying each sensor up to a maximum of [2].

\n
a.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each method that the marketing manager at Gustavo’s could use to collect feedback from customers about Dennis robots up to a maximum of [2].

\n
a.ii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying characteristic of a social robot up to a maximum of [2].

\n
a.iii.
\n
\n

Answers may include:

\n\n

 

\n
b.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.
\n
", "question_id": "18N.1.SL.TZ0.4", "topics": [ "topic-3-content" ], "subtopics": [ "3-7-robots-and-autonomous-technologies", "3-1-data", "3-6-artificial-intelligence" ] }, { "Question": "
\n

Artificial intelligence (AI) predicts earthquakes

\n

Scientists at universities are developing a machine learning system to detect the warning signs that an earthquake is likely to occur. Using pattern-recognition algorithms similar to those in image and speech recognition, the system would be able to predict earthquakes a few days before they occur. Using machine learning, researchers will be able to run earthquake analysis 500 times faster than they could previously.

\n

It is also possible to use machine learning to predict where the aftershocks* of an earthquake may occur (see Figure 4).

\n


Figure 4: Prediction of aftershocks using machine learning

\n

 

\n
\n

* aftershock: a smaller earthquake that follows a large earthquake

\n
\n

Identify two characteristics of pattern recognition.

\n
[2]
\n
a.i.
\n
\n

Outline one reason why it might be difficult to collect accurate data that can be used for predicting earthquakes.

\n
[2]
\n
a.ii.
\n
\n

Identify two characteristics of an algorithm.

\n
[2]
\n
a.iii.
\n
\n

Scientists used visualizations, such as in Figure 4, to present the information about predicted earthquake activity.

\n

Analyse the decision to use visualizations.

\n
[6]
\n
b.
\n
\n

Discuss the advantages and disadvantages of using machine learning to predict natural disasters like earthquakes.

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n

Award [1] for each characteristic of machine learning identified up to [2].

\n
a.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for a limitation of collecting data for predicting earthquakes and [1] for a development of that limitation up to [2].

\n
a.ii.
\n
\n

Answers may include:

\n\n\n

 

\n

Award [1] for each characteristic of an algorithm identified up to [2].

\n
a.iii.
\n
\n

Answers may include:

\n

Advantages of visualizations:

\n\n

Disadvantages of visualizations:

\n\n

\n
b.
\n
\n

Answers may include:

\n

Reasons why machine learning should be used to predict natural disasters:

\n\n

Reasons why machine learning should not be used to predict natural disasters:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: natural disasters, environment, data, algorithms, accuracy, reliability, change, systems, values, ethics

\n

 

\n

Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "21N.1.SL.TZ0.4", "topics": [ "topic-3-content" ], "subtopics": [ "3-1-data", "3-6-artificial-intelligence", "3-2-algorithms" ] }, { "Question": "
\n

Smart farming

\n

A government in East Africa is using the expertise of scientists at a university in the region to promote the culture of smart farming and increase the productivity of farmers (see Figure 5). To do this, they have developed an app that the farmers can use to assist them in their decision-making.

\n

Figure 5: An example of farming in East Africa

\n

\n

[Palmer, N., 2010. A farmer at work in Kenya’s Mount Kenya region [image] [online] Available at: https://commons.wikimedia.org/wiki/File:2DU_Kenya_86_(5367322642).jpg (CC BY-SA 2.0) https://creativecommons.org/licenses/by-sa/2.0/deed.en [Accessed 18 May 2020].]

\n

Unfortunately, the scientists who developed the app have received many complaints from farmers who have been unable to use it. They are considering two options:

\n\n

The scientists claim by making changes to the app it will make the app more user-friendly for the farmers. However, the farmers claim it would be better to provide them with education, such as training, so they can use the existing app.

\n

Evaluate these two claims.

\n
", "Markscheme": "
\n

Answers may include:

\n


Intervention 1: Making the system more user-friendly (claim)

\n

Advantages of making the system more user-friendly:

\n\n

Disadvantages of making the system more user-friendly:

\n\n

 

\n

Intervention 2: Educating the farmers to use the existing system (counter-claim)

\n

Advantages of educating the farmers to use the existing system:

\n\n

Disadvantages of educating the farmers to use the existing system:

\n\n

 

\n

In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: agriculture, training, education, innovation, costs, apps, networks, change, power, systems, values, ethics, feasibility

\n


Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "21N.1.HL.TZ0.5", "topics": [ "topic-5-hl-extension" ], "subtopics": [ "5-1-global-well-being" ] }, { "Question": "
\n

Smart warehouse

\n

Greenwood Industries’ warehouse uses a smart storage solution for the picking of products from the shelves of the warehouse. Robots are used in this automated picking process.

\n

Currently, these robots are programmed to access a knowledge base* that enables these robots to use the most efficient route for the picking of products.

\n

Greenwood Industries claims the picking process would be improved if the expert system was replaced by an artificial neural network (ANN).

\n

Discuss whether Greenwood Industries should replace the existing system with one that uses an artificial neural network (ANN).

\n
\n

* knowledge base: a set of rules that are manually input into an expert system.

\n

 

\n
", "Markscheme": "
\n

Answers may include:

\n

Reasons why Greenwood Industries should replace the expert system with an artificial neural network (ANN) (claim):

\n\n

Reasons why Greenwood Industries should not replace the expert system with an artificial neural network (ANN) (counter-claim):

\n\n

 

\n

In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: automation, training, costs, algorithms, artificial neural networks, machine learning, automation, change, systems, values, ethics, cost, feasibility

\n


Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "21N.1.HL.TZ0.6", "topics": [ "topic-2-concepts" ], "subtopics": [ "2-1-change" ] }, { "Question": "
\n

Automatic crop watering system

\n

Since 1990, Bertha Ascayo has been the manager of El Pallar, a farm in Chacra Province, where fruit trees are grown. In recent years, the climate has become more unpredictable, and the farm has suffered from periods of drought. Bertha is aware that she now needs to manage the watering of her fruit trees more than she has had to in the past.

\n

Bertha will need to make some improvements to the watering system by adding a rain sensor and use a computer program to automate the watering process. She has chosen a company that uses open-source software. The same company also installed the equipment for the watering of the trees.

\n

By using this software, Bertha can program a different watering plan for each type of tree. This includes programming the days of the week, times of the day, and length of the water cycle for each type of tree to be watered. For example, orange trees will be watered on Mondays and Thursdays at 6am for 45 minutes and at 8pm for 30 minutes.

\n
\n

Identify three characteristics of open-source software.

\n
[3]
\n
a.i.
\n
\n

A computer program uses data provided by a rain sensor to decide whether to water the trees. Identify three ways how the algorithm may be represented.

\n
[3]
\n
a.ii.
\n
\n

Water is becoming increasingly scarce in Chacra Province, and the provincial government is concerned there will be a point when there is not enough water for all of the farms to water their crops or fruit trees.

\n

To manage water for the watering of crops and fruit trees, the provincial government of Chacra Province intends to use computer modelling to calculate how much water each farm in the province will receive.

\n

Explain three factors that will contribute to the accuracy of this computer model.

\n
[6]
\n
b.
\n
\n

The farmers of Chacra Province are concerned about the provincial government using a computer model to determine the amount of water they will be allowed to use to water their fruit trees.

\n

To what extent should the farmers of Chacra Province rely on their knowledge and experience, rather than the computer-based solution provided by the provincial government, to manage the watering of the fruit trees?

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each characteristic of open-source software up to a maximum of [3] marks.

\n
a.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each way the algorithm may be represented up to a maximum of [3] marks.

\n
a.ii.
\n
\n

Answers may include:

\n\n\n\n\n\n

 

\n

Award [1] for identifying a factor that will contribute to the accuracy of the model and [1] for explanation why that will contribute to the accuracy of the model up to maximum of [2] marks.

\n

OR

\n

Award [1] for each example given and an additional [1] if the explanation contributes to the accuracy of the model up to a maximum of [2] marks.

\n


Mark as [2] + [2] + [2].

\n
b.
\n
\n

Answers may include:

\n

Knowledge and experience will:

\n\n

Use of the provincial model will:

\n\n

Use of the computer system will:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: agriculture, ecosystems, algorithm, accuracy, reliability, model, modelling, judgement, automation, change, power, systems, ethics, values

\n

 

\n

Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "21M.1.SL.TZ0.1", "topics": [ "topic-3-content", "topic-2-concepts" ], "subtopics": [ "3-1-data", "2-1-change", "3-5-media", "3-2-algorithms" ] }, { "Question": "
\n

Exoskeletons1 for workers

\n

Many jobs in modern manufacturing still require human workers, and many of these jobs involve lifting and carrying heavy loads. Some jobs require workers to maintain unnatural positions for a long period of time or hold tools for many hours. Workers doing these jobs are exposed to possible injuries, resulting in sick days or even a shortened work life. The Robo-Assist project is an attempt to address these problems (see Figure 2).

\n

Robo-Assist is a lightweight powered exoskeleton that uses motors and sensors to enable workers to bear only a small part of the weight of any load they are carrying.

\n

Robo-Assist has three supporting modules: one for the arms to help with lifting, one for the torso2 to support the back and spine, and one for the legs to support the inner thigh so lifting is easier.

\n

Figure 2: The Robo-Assist exoskeleton

\n

 

\n

A group of designers and engineers worked for three years to develop the prototype of the Robo-Assist arm module shown in Figure 3.

\n

Figure 3: Prototype of Robo-Assist arm module

\n

 

\n

In addition to preventing injuries, exoskeletons can use global positioning systems (GPS) to collect data about a worker’s location, vital signs, and neural signals, as well as other information relating to the user. Overall, Robo-Assist should make workers’ jobs easier and faster. The ultimate goal is to make Robo-Assist available for sale to industries for them to purchase for their workers.

\n
\n

1   exoskeletons: external wearable frameworks that strengthen a human’s natural physical ability
2   torso: the part of the human body that does not include the head, arms or legs

\n
\n

Identify two components of a global positioning system (GPS).

\n
[2]
\n
a.ii.
\n
\n

Identify two key stakeholders involved in this project.

\n
[2]
\n
a.iii.
\n
\n

The research team developing the Robo-Assist project used quantitative and qualitative data to gather information relating to the user.

\n

Explain why the research team collected quantitative and qualitative data.

\n
[6]
\n
b.
\n
\n

Other than for the prevention of injuries, discuss the impacts on workers and employers of the use of exoskeletons in the workplace.

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n


Award [1] mark for each component of a global positioning system (GPS) identified up to a maximum of [2] marks.

\n
a.ii.
\n
\n

Answers may include:

\n\n


Award [1] mark for each stakeholder identified up to a maximum of [2] marks.

\n
a.iii.
\n
\n

Answers may include:

\n

Quantitative data:

\n\n

Qualitative data:

\n\n

Reasons for the collection of both types of data:

\n\n

\n

Keywords: quantitative, qualitative, classification, categorization, statistically significant, nuance, trends, patterns

\n
b.
\n
\n

Possible impacts include:

\n\n

 

\n

N.B.: Some students may develop the impact of injuries on the workers or the companies. If they go beyond what is already stated in the question, this is an acceptable approach.  

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.  

\n

Keywords: exoskeletons, health, business organization, regulations, responsibility, accountability, judgement, reliability, sensors, sensory inputs, data, change, systems, values

\n

 

\n

Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "18M.1.SL.TZ0.4", "topics": [ "topic-4-contexts", "topic-3-content", "topic-2-concepts" ], "subtopics": [ "4-3-environmental", "3-1-data", "2-1-change" ] }, { "Question": "
\n

Technology disruption in Orams Academy

\n

Many schools use virtual learning environments (VLEs), such as Firefly, PowerSchool Learning, Schoology, Final Site LMS, and Google Classroom. The VLE is used for document storage, lesson content, and homework management as well as for communication between the school, students and parents.

\n

In addition to the VLE, collaborative cloud-based online tools, such as Google G Suite and Microsoft Office 365, are used by students and teachers.

\n

Recently, Daniela Stark, the principal at Orams Academy, has become concerned that using only one VLE may not prove to be as beneficial as originally thought. She has heard that some teachers and students are also successfully using social media tools, such as Facebook, Twitter and Instagram, to share their learning. She has also been told that the lack of bandwidth that the school experiences at times can cause problems.

\n

Daniela is considering an alternative approach, allowing teachers and students to choose the most appropriate tools to manage their learning.

\n
\n

Identify two characteristics of cloud-based storage.

\n
[2]
\n
a.i.
\n
\n

Identify two reasons why there might be a lack of bandwidth at times on the school’s network.

\n
[2]
\n
a.ii.
\n
\n

Identify two potential disadvantages of using online digital media.

\n
[2]
\n
a.iii.
\n
\n

The increasing use of cloud-based applications and online collaborative tools has led to Orams Academy introducing an acceptable use policy for students and teachers.

\n

Explain three reasons why Orams Academy decided to introduce an acceptable use policy.

\n
[6]
\n
b.
\n
\n

Discuss whether Daniela should make every teacher at Orams Academy use the same learning platform or allow each teacher to choose their own preferred learning management approach.

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n

Award [1] for each characteristic of cloud-based storage identified up to [2] marks.

\n
a.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for each reason identified up to [2] marks.

\n
a.ii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each disadvantage of using online digital media up to [2] marks.

\n
a.iii.
\n
\n

Answers may include:

\n\n\n\n\n\n

 

\n

Award [1] for each reason given and an additional [1] for a development of this reason up to a maximum of [2] marks.

\n

Mark as [2] + [2] + [2].

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: cloud, policy, security, ubiquity, digital media, remote learning, change, spaces, systems, values

\n
b.
\n
\n

Answers may include:

\n

A single learning platform:

\n\n

Teachers choosing their own preferred learning management approach:

\n\n

 

\n

Keywords: business, learning, education, training, judgement, platform, monitoring, acceptable use policy, interoperability, policy, change, systems, values

\n

 

\n

Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "21M.1.SL.TZ0.2", "topics": [ "topic-3-content", "topic-1-introduction", "topic-2-concepts" ], "subtopics": [ "3-4-networks-and-the-internet", "1-1-what-is-digital-society", "2-1-change" ] }, { "Question": "
\n

Medical data shared in online apps

\n

Many people use smartwatches to monitor their vital signs and manage their health. Information such as heart rate, blood pressure and body temperature can be obtained from an app* like yourHealth on a smartwatch.

\n


Figure 1: The yourHealth app and smartwatch

\n

\n


Some users of the smartwatch app are concerned that their privacy might be invaded.

\n
\n

app: an abbreviation for “application”, a specialized program run on mobile devices, a computer, or other electronic device

\n
\n

The uniform resource locator (URL) for the smartwatch app in Figure 1 is https://www.yourhealthwatch.com/2020/03/export-data-yourhealth-watch-health-app.html.

\n
\n

Define the term privacy.

\n
[2]
\n
a.i.
\n
\n

Identify two ways the smartwatch and cellphone (mobile phone) could use to communicate with each other.

\n
[2]
\n
a.ii.
\n
\n

Outline one reason why protocols such as https are used in the URL to enable digital devices such as the smartwatch and cellphone to communicate with each other.

\n
[2]
\n
a.iii.
\n
\n

Explain why end-users should be involved in the development of software products such as the smartwatch app.

\n
[3]
\n
b.i.
\n
\n

Explain why the developers of software products such as the smartwatch app have an ethical obligation to potential users.

\n
[3]
\n
b.ii.
\n
\n

Many people use smartwatches to monitor their vital signs and manage their health.

\n

To what extent should an individual use a smartwatch to manage their health?

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying privacy and [1] for an additional comment.

\n
a.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each way that the smartwatch and the cellphone could use to communicate with each other up to [2].

\n
a.ii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying a reason why protocols such as https are used in the URL to enable digital devices such as the smartwatch and cellphone to communicate with each other and [1] for a development of that reason up to [2].

\n
a.iii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying a reason why end-users should be involved in the development of products such as the smartwatch app and [1] for each subsequent development of that reason up to [3].

\n
b.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying a reason why the developers of software products such as the smartwatch app have an ethical obligation to the potential users and [1] for each subsequent development of that reason up to [3].

\n
b.ii.
\n
\n

Answers may include:

\n

Advantages:

\n\n

Disadvantages:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: health, well-being, algorithm, accuracy, reliability, data, model, modelling, judgement, automation, change, power, systems, ethics, values

\n


Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document
.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.i.
\n
\n[N/A]\n
b.ii.
\n
\n[N/A]\n
c.
\n
", "question_id": "22M.1.SL.TZ0.1", "topics": [ "topic-3-content" ], "subtopics": [ "3-1-data", "3-4-networks-and-the-internet", "3-2-algorithms" ] }, { "Question": "
\n

Social robots

\n

When many people think of robots, they think of them in large-scale industrial settings, such as manufacturing automobiles (cars), but this is not always the case. Figure 2 shows an image of Robbi, the first social robot for the home. Robbi can be purchased for US$699.

\n

Figure 2: Robbi

\n

\n

Robbi is connected to the Internet of Things (IoT). The IoT is “the network of physical objects – or ‘things’ – embedded with electronics, software, sensors and network connectivity, which enables these objects to collect and exchange data”1.

\n

Robbi is able to carry out simple tasks, such as reminding someone when they have an important meeting, or turning the heating or air conditioning on or off in a person’s house while they are away.

\n

 

\n
\n

1 Wikipedia, “Internet of things” (https://en.wikipedia.org/wiki/Internet_of_things)

\n
\n

Identify two sensors that Robbi could use.

\n
[2]
\n
a.i.
\n
\n

Identify the steps Robbi would take in order to turn the air conditioning on and off.

\n
[4]
\n
a.ii.
\n
\n

It has been decided to provide only online access to documentation for Robbi. There will be no downloadable PDFs.  

\n

Analyse this decision.

\n
[6]
\n
b.
\n
\n

Robbi’s website claims that, “Robbi is friendly, helpful and intelligent. He can sense and respond, and learns as you engage with him”. Some of the customers who own Robbi are considering whether they could extend the range of tasks Robbi could perform, or whether they should allow Robbi to make decisions for them.

\n

To what extent should individuals rely on social robots like Robbi to act as decision-makers for them?

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

Award [1] for identifying each sensor that Robbi could use up to a maximum of [2].

\n
a.i.
\n
\n

Answers may include:

\n\n


Award [1] for identifying each step Robbi would take in order to turn on and off the air conditioning up to a maximum of [4]

\n
a.ii.
\n
\n

Answers may include:

\n\n

 

\n

\n


Keywords: skills, connectivity, access, change, systems

\n
b.
\n
\n

Answers may include:

\n

Reasons why individuals could rely on robots such as Robbi to act as decision-makers for them: ·   

\n\n

Reasons why individuals should not rely on robots such as Robbi to act as decision-makers for them: 

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: automation, connectivity, social robots, change, power, systems, values, ethics, accountability, transparency, autonomy, decision-making, judgement

\n

 

\n

Refer to SL/ HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "17N.1.SL.TZ0.4", "topics": [ "topic-3-content", "topic-4-contexts", "topic-5-hl-extension" ], "subtopics": [ "3-3-computers", "3-2-algorithms", "4-5-human-knowledge", "5-1-global-well-being" ] }, { "Question": "
\n

App or intuition?

\n

Apps have been developed that allow a customer to submit a trip request to a taxi company on their smartphone. These apps allow the customer to select the starting point and final destination of the journey as well as add other information, such as the time of journey and number of passengers.

\n

The developers of the taxi journey app claim it can capture the real-time details of a journey, including the starting point, route, distance travelled, the speed of the car and the final destination. The app integrates this information with real-time traffic information, such as closed roads or accidents. Fares can be estimated before the journey, and the customer can pay digitally with their credit card or by PayPal.

\n

Some traditional taxi drivers in cities such as Paris and Rio de Janeiro have campaigned against the introduction of these apps in taxi companies. Based on previous journeys recorded by the app, the taxi company recommends that their taxi drivers rely on the taxi journey app rather than their own knowledge of the city when determining the best route.

\n

Discuss whether the taxi driver should rely on the taxi journey app, rather than their own knowledge of the city, when determining the best route.

\n
", "Markscheme": "
\n

Answers may include:

\n

Rely on the taxi journey app (claim)

\n\n

Rely on driver’s knowledge and intuition (counter-claim)

\n\n

 

\n

In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: change, power, systems, values, ethics, apps, security, privacy, algorithms, transparency, reliability, surveillance, cost, feasibility

\n

 

\n

Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "18N.1.HL.TZ0.5", "topics": [ "topic-3-content" ], "subtopics": [ "3-1-data" ] }, { "Question": "
\n

Selecting candidates for political parties

\n

Political parties often have large numbers of applicants who wish to act as representatives in their various governing bodies. A senior party official must make the final decision about which applicants should be offered which roles. Many roles receive as many as 15 applications, and it is not possible to interview each applicant.

\n

In an attempt to streamline the application process, a prospective representative will need to complete two tasks:

\n
    \n
  1. Completing an online questionnaire.
  2. \n
  3. Submitting a video where they explain the reasons behind their application.
  4. \n
\n

Neither task will involve the team in the political party.

\n

The applicants will be directed to a link provided by the software developer where they can complete both tasks. The responses to the questionnaires and the videos will be analysed using artificial intelligence (AI).

\n

The software will score the questionnaire and video for each applicant and send it to the senior party official’s team. The applicants with the highest scores will then be invited by the political party for an interview.

\n

The software developers claim this will reduce the number of applications the senior party official needs to process and lead to the most appropriate applicants being selected for an interview.

\n

Discuss whether the political party should introduce the digital system to assist the senior party official when deciding which applicants should be offered roles as representatives.

\n
", "Markscheme": "
\n

Answers may include:

\n

Introduce the digital system (claim):

\n\n

Not introduce the digital system (counter-claim):

\n\n

 

\n

In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: change, power, systems, ethics, values, judgement, intuition, bias, algorithm, transparency, reliability, automation, cost, innovation

\n

 

\n

Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "18N.1.HL.TZ0.6", "topics": [ "topic-2-concepts" ], "subtopics": [ "2-1-change" ] }, { "Question": "
\n

Can digital technologies be used sustainably?

\n

Many organizations claim that the most efficient use of information technology (IT) equipment, such as laptops and printers, is to replace them on a regular basis. For example, an organization’s strategy may be to do this every three years.

\n

Other organizations purchase IT equipment that can easily be upgraded by increasing the storage and memory or upgrading the processing capabilities only when required. They claim they do not need to replace their IT equipment on such a regular basis and believe this is a more sustainable practice.

\n

Evaluate the sustainability of these two strategies.

\n
", "Markscheme": "
\n

Answers may include:

\n

Replacing IT equipment on a regular basis: (claim)

\n\n

Increasing the specification of the IT equipment: (counter-claim)

\n\n

Conclusions:

\n

The strategy chosen can be justified as:

\n\n

 

\n

In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: responsible consumption, waste prevention, green computing, e-waste, planned obsolescence, economic, pollution, waste, Moore’s Law, CPU, central processing unit, memory, systems, change, values, equity, feasibility

\n

 

\n

Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "18M.1.HL.TZ0.5", "topics": [ "topic-2-concepts" ], "subtopics": [ "2-1-change" ] }, { "Question": "
\n

Policing as a human activity?

\n

Toby Walsh, Professor of Artificial Intelligence at the University of New South Wales, Australia, notes that the use of police robots raises “many important questions that we, as a society, have to think about”.

\n

Singapore has started testing patrol robots that survey pedestrian areas in the city-state. Xavier, the mall-cop robot, will be autonomously rolling through the Toa Payoh central district for three weeks scanning for “undesirable social behaviours”.

\n

Figure 4 shows an example of a patrol robot.

\n

Figure 4: An example of a patrol robot

\n

\n

[Image by Jdietsch. PatrolBot.jpg (https://commons.wikimedia.org/wiki/File:PatrolBot.jpg). 
Under copyright and licensed under a Creative Commons Attribution 3.0 International License,
https://creativecommons.org/licenses/by-sa/3.0/deed.en (image cropped)]

\n


It has been claimed that the use of patrol robots will lead to more efficient policing.

\n

Discuss the extent to which police departments should use patrol robots as a strategy to aid policing.

\n
", "Markscheme": "
\n

Answers may include:

\n

Benefits of robots: (claim)

\n\n

Problems with robots: (counter-claim)

\n\n

Decision-making and guidelines that determine the extent to which robots can be used in policing:

\n\n

 

\n

In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: crime, law, regulation, accountability, responsibility, acceptance, transparency, privacy, anonymity, intuition, judgement, surveillance, networks, bandwidth, robots, automation, decision-making, change, power, systems, ethics, values, feasibility

\n

 

\n

Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "18M.1.HL.TZ0.6", "topics": [ "topic-5-hl-extension" ], "subtopics": [ "5-1-global-well-being" ] }, { "Question": "
\n

Google health care data

\n

Google is developing an app to assist hospitals in monitoring kidney disease in patients. To develop this app, Google has signed an agreement with the UK’s National Health Service (NHS) that will give Google access to data on over one and a half million patients held in the NHS database.

\n

The database includes health-related data as well as personal data, some of which is sensitive.

\n

Google plans to use data analytics techniques and artificial neural networks (ANNs) to analyse the data and provide information that can be used to improve the app. Once the app has been developed, it will be provided to the NHS.

\n
\n

Identify two items of health-related data that could be used to improve the treatment of patients.

\n
[2]
\n
a.i.
\n
\n

Identify two reasons why organizations like the NHS would use data analytics.

\n
[2]
\n
a.ii.
\n
\n

Identify two reasons why NHS records are stored in a database rather than in a spreadsheet.

\n
[2]
\n
a.iii.
\n
\n

The agreement between Google and the NHS includes policies for the collection, storage and sharing of patient data.

\n

Explain why it is important that the agreement between Google and the NHS includes policies for the collection, storage and sharing of patient data.

\n
[6]
\n
b.
\n
\n

Evaluate the decision by the NHS to share patient data with Google.

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n


Award [1] for identifying each item of health-related data that could be used to improve the treatment of patients up to a maximum of [2].

\n
a.i.
\n
\n

Answers may include:

\n\n


Award [1] for identifying each reason why organizations such as the NHS would use up to maximum of [2].

\n
a.ii.
\n
\n

Answers may include:

\n

Reasons to not use spreadsheets:

\n\n

Reasons to use a database:

\n\n

 

\n

Award [1] for identifying each reason why NHS records are stored in a database rather than a spreadsheet up to maximum of [2].

\n
a.iii.
\n
\n

Answers may include:

\n

A policy is required for collection:

\n\n

A policy is required for storage:

\n\n

A policy is required for sharing:

\n\n

 

\n

N.B.: The response requires an explanation of why a policy is required rather than discussion of what is included in the policy. There must be an explanation for why each policy is required.

\n

Award [1] for identifying why a policy for the collection, storage and sharing of patient data is required and [1] for a development of the explanation up to a maximum of [2].

\n

Mark as [2] + [2] + [2].

\n
b.
\n
\n

Answers may include:

\n

Reasons for sharing the patient data with Google:

\n\n

Reasons for not sharing the patient data with Google:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: health, data, patient, analytics, privacy, anonymity, security, change, power, systems, values, ethics

\n

 

\n

Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "18N.1.SL.TZ0.1", "topics": [ "topic-3-content", "topic-2-concepts" ], "subtopics": [ "3-1-data", "2-1-change" ] }, { "Question": "
\n

Cell phone farmers

\n

Many farmers in Cameroon are not able to use the internet due to the very limited communication infrastructure in the country. In addition, accessing the internet is expensive for most farmers.

\n

As many farmers have cell/mobile phones, they could make better use of technologies such as text messaging (SMS*) to access information that would assist them in their farming.

\n

However, recent research has suggested that a lack of internet access is not the main factor limiting the development of farming in Cameroon: the main factor is farmers’ lack of IT knowledge.

\n

Some farmers in Cameroon are trialling a system called Agritexte, which uses text messages to provide information on the market prices of produce, such as cassava leaves and cocoa (see Figure 1).

\n

Figure 1: An example of a text message

\n

\n
\n

* SMS: short message service

\n
\n

Identify two advantages of using text messaging to communicate.

\n
[2]
\n
a.i.
\n
\n

Identify two items that contribute to the cost of accessing the internet.

\n
[2]
\n
a.ii.
\n
\n

Outline the difference between the internet and the World Wide Web.

\n
[2]
\n
a.iii.
\n
\n

Analyse the effectiveness of using face-to-face (F2F) training compared to distance learning to train farmers to use Agritexte.

\n
[6]
\n
b.
\n
\n

The government of Cameroon is watching the results of the Agritexte initiative. It is considering two options:

\n\n

Evaluate these two options.

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n


Award [1] for identifying each advantage of using text messaging up to a maximum of [2].

\n
a.i.
\n
\n

Answers may include:

\n\n

 

\n

Do not accept costs related to the limited infrastructure.

\n

Award [1] for identifying each item that contributes to the cost of internet access up to maximum of [2].

\n
a.ii.
\n
\n

Answers may include:

\n\n

 

\n

The response must make reference to both the internet and the World Wide Web. Do not award marks if only one is mentioned.

\n

Award [1] for identifying each difference up to maximum of [2].

\n
a.iii.
\n
\n

Answers may include:

\n

Advantages of F2F training:

\n\n

Disadvantages of F2F training:

\n\n

Advantages of distance learning:

\n\n

Disadvantages of distance learning:

\n\n

 

\n

\n
b.
\n
\n

Answers may include:

\n

Extending the functionality of Agritexte:

\n\n

Investing in education and training:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.  

\n

Keywords: education, training, agriculture, infrastructure, text, web, skills, change, systems, values, ethics

\n

 

\n

Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "18N.1.SL.TZ0.2", "topics": [ "topic-3-content", "topic-1-introduction", "topic-2-concepts" ], "subtopics": [ "3-5-media", "1-1-what-is-digital-society", "3-4-networks-and-the-internet", "2-1-change" ] }, { "Question": "
\n

Online learning

\n

TailorEd is a free online learning system that personalizes students’ learning by providing teachers with data about how students are progressing in their courses. Students create a personal profile and work through the assignments at their own pace. Teachers can log in to the learning system to see how the students are progressing. However, concerns have been expressed about the amount of data that is being collected.

\n

The school has found that when students access the course platform, some content is being blocked. The network administrator has been asked to investigate the situation. Teachers believe that it would be more appropriate to train the students to use the platform responsibly, rather than use technology to block their access to certain websites.

\n
\n

Identify two ways how the TailorEd system could provide feedback to students.

\n
[2]
\n
a.i.
\n
\n

Identify two ways how the data collected about students’ academic progress could be used by TailorEd.

\n
[2]
\n
a.ii.
\n
\n

Outline how a firewall functions.

\n
[2]
\n
a.iii.
\n
\n

There are two possible methods for ensuring students use the TailorEd online learning system responsibly. They are:

\n\n

Analyse these two methods.

\n
[6]
\n
b.
\n
\n

To what extent do the benefits of collecting students’ academic progress data outweigh the concerns of the students, teachers and parents?

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each way the TailorEd system could provide feedback to students up to maximum of [2].

\n
a.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each way the data collected about students’ academic progress could be used by TailorEd up to maximum of [2].

\n
a.ii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying the basic function of a firewall and [1] for a development of the initial idea up to maximum of [2].

\n
a.iii.
\n
\n

Answers may include:

\n

Reasons for restricting access to sites that may be considered inappropriate:

\n\n

Reasons for educating students about acceptable use:

\n\n

 

\n

\n

Keywords: education, training, relationships, trust, wisdom, judgement, expression, identity, power, systems, ethics, values

\n
b.
\n
\n

Answers may include:

\n

Benefits of collecting students’ progress data:

\n\n

Concerns of the students, teachers and parents:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: education, trust, wisdom, quantitative, qualitative, judgement, accountability, security, monitoring, power, systems, ethics, values

\n

 

\n

Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "19N.1.SL.TZ0.3", "topics": [ "topic-2-concepts", "topic-3-content" ], "subtopics": [ "2-1-change", "3-1-data", "3-4-networks-and-the-internet" ] }, { "Question": "
\n

Automated medical image analysis

\n

EBBZS IT, based in Groningen, the Netherlands, intends to develop a system using artificial intelligence (AI) to help doctors at Joelstraat Hospital interpret medical images.

\n

Due to the high resolution* of the digital images (see Figure 4), EBBZS IT claims the AI system will be able to learn from these images to assist doctors when diagnosing patients’ illnesses.

\n

EBBZS IT also claims the AI system will be able to cope with the significant increase in the volume of patients and the increased complexity of their symptoms and conditions.

\n

Figure 4: Examples of digital images used in the AI system

\n

\n

[National Institutes of Health: https://commons.wikimedia.org/wiki/File:
Human_ brain_development_1wk-3mo-1yr-2yr-10yr-T1W-MRI.PNG]

\n

 

\n
\n

* resolution: the detail an image holds. It can be measured in pixels per centimetre.

\n


Discuss the claim by EBBZS IT that the diagnosis of patients’ illnesses should be based on the information provided by the AI system.

\n
", "Markscheme": "
\n

Answers may include:

\n

Reasons for basing the diagnosis of the patients on the recommendations of the AI system (claim):

\n\n

Reasons for not basing the diagnosis of the patients on the recommendations of the AI system (counter-claim):

\n\n

 

\n

In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: health, AI, artificial intelligence, pattern recognition, image analysis, storage, judgement, intuition, accountability, digital media, image, change, power, systems, values, ethics, feasibility, acceptability, costs

\n


Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "19N.1.HL.TZ0.6", "topics": [ "topic-3-content" ], "subtopics": [ "3-1-data" ] }, { "Question": "
\n

E-voting

\n

A number of countries, such as India, have introduced e-voting systems. Citizens can vote by going to a specified location, such as a school, or they can vote from home using a computer. Each voter is provided with a unique identifier, such as IND55454, that they must enter into the system when they vote.

\n

These e-voting systems usually consist of a user interface (see Figure 1), linked to a relational database (see Figure 2).

\n

Figure 1: An example of an e-voting interface

\n

\n


Figure 2: An example of a relational database

\n

\n
\n

Describe two features of the user interface in Figure 1 that make it intuitive.

\n
[4]
\n
a.i.
\n
\n

Outline one advantage of using a relational database to store this data.

\n
[2]
\n
a.ii.
\n
\n

A number of individuals and groups were consulted during the design of the e-voting system to enable designers to create an intuitive interface for it.

\n

Analyse questionnaires and interviews as methods of data collection to gather this information from these individuals and groups.

\n
[6]
\n
b.
\n
\n

Some states are planning to return to a paper-based voting system, where voters put a cross (X) in the column next to the party of their choice.

\n

Discuss whether these states should retain e-voting or return to a paper-based voting system.

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n\n\n

 

\n

Award [1] for identifying a feature of the user interface in Figure 1 that makes it intuitive and [1] for a development of that feature up to a maximum of [2].

\n

Mark as [2] + [2].

\n
a.i.
\n
\n

Answers may include:

\n\n\n

Award [1] for identifying an advantage of using a relational database to store this data and [1] for a development of that reason up to a maximum of [2].

\n
a.ii.
\n
\n

Answers may include:

\n

Questionnaires:

\n\n

Interviews:

\n\n
b.
\n
\n

Answers may include:

\n

Advantages of retaining e-voting:

\n\n

Disadvantages of retaining e-voting:

\n\n

Advantages of reverting to paper voting: 

\n\n

Disadvantages of reverting to paper voting:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: voting, elections, e-voting, reliability, privacy, security, digital divide, inclusion, change, power, spaces, systems, values, ethics

\n


Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "20N.1.SL.TZ0.1", "topics": [ "topic-3-content" ], "subtopics": [ "3-1-data" ] }, { "Question": "
\n

Artificial neural networks are changing surveillance

\n

Currently, security cameras record activities in supermarkets and a security guard watches the camera footage in real time. If the guard sees something suspicious, action can be taken. The company AI Security Innovations is looking at ways to further develop this technology using artificial intelligence (AI) to automate the process.

\n

The field of AI is developing rapidly and is being transformed by machine learning using artificial neural networks (ANNs). AI Security Innovations wants to link the cameras to an AI system that can distinguish between something innocent, such as a child playing with a toy gun, and a crime, such as shoplifting (see Figure 2). The AI security camera system will be designed to make the decision about whether to intervene or not. This could include “locking down” the premises to secure all exits so that a suspect cannot escape, or sending an alert in real time to the police.

\n

Figure 2: An example of a security camera

\n

\n

[Source: https://pixabay.com/photos/video-camera-surveillance-camera-3121655/]

\n


These cameras will be part of extremely sophisticated detection systems based on pattern recognition. They will be able to detect humans, rapidly separate authorized personnel from intruders, and match faces from multiple camera sources in order to track people moving from location to location. Researchers are even exploring systems that can detect the presence of concealed guns based on the way an individual walks.

\n
\n

Identify two types of artificial intelligence (AI).

\n
[2]
\n
a.i.
\n
\n

Identify two types of machine learning.

\n
[2]
\n
a.ii.
\n
\n

Outline how pattern recognition works.

\n
[2]
\n
a.iii.
\n
\n

Identify two advantages of using artificial neural networks (ANNs).

\n
[2]
\n
b.i.
\n
\n

Identify two disadvantages of using artificial neural networks (ANNs).

\n
[2]
\n
b.ii.
\n
\n

Identify two characteristics of deep learning.

\n
[2]
\n
b.iii.
\n
\n

To what extent should pattern recognition in AI systems be trusted to make decisions about sending real-time alerts to the police?

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each type of AI up to maximum of [2].

\n
a.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each type of machine learning up to maximum of [2].

\n
a.ii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each aspect of how pattern recognition functions up to maximum of [2].

\n
a.iii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for each advantage of artificial neural networks identified up to maximum of [2].

\n
b.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for each advantage of artificial neural networks identified up to maximum of [2].

\n
b.ii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for each characteristic of deep learning identified up to maximum of [2].

\n
b.iii.
\n
\n

Answers may include:

\n

Reasons why pattern recognition in AI systems should be trusted to make decisions about sending real-time alerts to police: 

\n\n

Reasons why pattern recognition in AI systems should not be trusted to make decisions about sending real-time alerts to police:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: policies, laws, regulations, automation, reliability, privacy, monitoring, surveillance, trust, transparency, accountability, algorithms, bias, change, power, systems, values, ethics

\n

 

\n

Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.i.
\n
\n[N/A]\n
b.ii.
\n
\n[N/A]\n
b.iii.
\n
\n[N/A]\n
c.
\n
", "question_id": "19N.1.SL.TZ0.4", "topics": [ "topic-3-content" ], "subtopics": [ "3-6-artificial-intelligence", "3-1-data" ] }, { "Question": "
\n

BYOD at Xingu Academy

\n

Some students at Xingu Academy have been allowed to “bring your own device (BYOD)” into school so they can use assistive technologies, such as speech-to-text, to support their learning (see Figure 3). Mayu Jimenez, the Head of Learning and Teaching, has seen the benefits for these students. A number of other teachers believe there will be benefits if the school becomes a BYOD school. However, before a decision can be made, Alejandro Gandolla, the Head of IT, has been asked to investigate whether the school would be able to cope with the demands of the increased number of devices.

\n

Figure 3: Assistive technologies

\n

\n
\n

Identify two pieces of information that would be used to identify a device on the IT network.

\n
[2]
\n
a.i.
\n
\n

Identify the steps used by speech-to-text software.

\n
[4]
\n
a.ii.
\n
\n

Digital citizenship is included in Xingu Academy’s IT acceptable use policy.

\n

Explain why it is important that students at Xingu Academy are both competent users of digital technologies and good digital citizens.

\n
[6]
\n
b.
\n
\n

Discuss whether Xingu Academy should become a bring-your-own-device (BYOD) school.

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each piece of information the IT department would use to identify the device on the IT network, up to a maximum of [2].

\n
a.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each step that the text-to-speech software uses up to a maximum of [4].

\n
a.ii.
\n
\n

Answers may include:

\n

Reasons for being competent users of digital technologies:

\n\n

Reasons for being good digital citizens:

\n\n

 

\n

\n
b.
\n
\n

Answers may include:

\n

Reasons why Xingu Academy should become a bring-your-own-device (BYOD) school:

\n\n

Reasons why Xingu Academy should not become a bring-your-own-device (BYOD) school:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: education, networks, BYOD, device, trust, authentication, security, VPN, cloud, change, power, spaces, systems, values, ethics

\n


Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "20N.1.SL.TZ0.2", "topics": [ "topic-3-content", "topic-1-introduction" ], "subtopics": [ "3-4-networks-and-the-internet", "3-2-algorithms", "3-5-media", "1-1-what-is-digital-society" ] }, { "Question": "
\n

Sharing dashcam* footage with police

\n

Many police departments have started campaigns to encourage members of the public to upload footage of possible offences committed by drivers to police websites. The police are looking for footage of activities such as dangerous driving and driving whilst talking on a cellphone/mobile phone.

\n

Members of the public can create an account on the police website to upload footage from their dashcam (see Figure 3). They can also upload their dashcam footage anonymously.

\n

The police claim that using dashcam footage uploaded by the public will help reduce the number of accidents caused by dangerous driving.

\n

Figure 3: An example of a dashcam

\n

\n

 

\n
\n

* dashcam: a video camera mounted in a vehicle to record activity on roads

\n


Discuss whether this dashcam footage should be used by the police as part of their strategy to reduce the number of accidents caused by dangerous driving.

\n
", "Markscheme": "
\n

Answers may include:

\n

Advantages of a using dashcam footage (claim):

\n\n

Disadvantages of a dashcam footage (counter-claim):

\n\n

 

\n

In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: authenticity, anonymity, surveillance, bandwidth, storage, security, cloud, digital media, change, power, systems, values, ethics, feasibility, acceptability

\n


Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "19N.1.HL.TZ0.5", "topics": [ "topic-2-concepts" ], "subtopics": [ "2-1-change" ] }, { "Question": "
\n

Airport luggage control

\n

Large airports need to handle thousands of pieces of luggage (including suitcases and other types of baggage) from the moment passengers check them in at the counter until the moment they arrive at their final destination. Sometimes a passenger will change airplanes during their journey, so their bags will need to be transferred by conveyor belt from one plane to another.

\n

When the passenger checks in at the airline counter, a tag is printed and attached to each piece of luggage (see Figure 2). This tag has information about the passenger and their journey printed on it and also shows both a barcode and a ten-digit number that are unique to each piece of luggage.

\n

Figure 2: A luggage tag

\n

\n

[Image by AlexStef at English Wikipedia. Dca-baggage-tag.jpg (https://commons.wikimedia.org/wiki/File:Dca-baggage-tag.jpg). Under copyright and licensed under a Creative Commons Attribution 3.0 International License, https://creativecommons.org/licenses/by-sa/3.0/deed.en]

\n

The luggage then goes on to a number of conveyor belts that take each bag to where it needs to go. Conveyor belts connect to other conveyor belts that direct luggage from the airport building to the correct airplane, from one airplane to the next if the passenger changes airplanes during the journey, or to the baggage reclaim area at the end of the journey. The airport luggage control system will know when to push the bag from one conveyor belt to another to ensure it gets to the correct destination.

\n
\n

The barcode allows the airport’s luggage control system to access a database containing information about each piece of luggage.

\n
\n

Identify two pieces of information about the luggage that may be obtained from this database.

\n
[2]
\n
a.i.
\n
\n

Identify the steps taken by the luggage control system to decide which conveyor belt to choose when a bag reaches a junction between two conveyor belts.

\n
[4]
\n
a.ii.
\n
\n

Analyse the decision by some airports to attach radio frequency identification (RFID) tags to luggage when it is checked in by the passenger, instead of barcode paper printed tags.

\n
[6]
\n
b.
\n
\n

Airlines have databases that contain data about passengers when tickets are booked. This data includes travel dates, itineraries, contact details, passport details and passengers’ home addresses. When passengers purchase a ticket online from an airline company, they have to accept the airline’s terms and conditions by clicking “Agree” (see Figure 3).

\n

Figure 3: Acceptance of airline terms and conditions

\n

\n

Within these terms and conditions, it states that the airline may receive a request to share this data with the government of the country to which the passenger is flying.

\n

Discuss whether airlines should share passengers’ data with the governments of the countries to which they are flying.

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n

NB: Do not accept simply “journey” – sufficient detail must be given.

\n

Award [1] for identifying each piece of information about the luggage that may be obtained from this database up to [2].

\n
a.i.
\n
\n

Answers may include:

\n\n

 

\n

NB: Responses must make reference to the IT system(s) involved.

\n

Award [1] for identifying each of the steps taken by the system to decide if a bag is pushed to a different conveyor or not when arriving at a junction up to [4].

\n
a.ii.
\n
\n

Answers may include:

\n

Advantages of barcodes on printed tags:

\n\n

Disadvantages of barcodes on printed tags:

\n\n

Advantages of RFID tags:

\n\n

Disadvantages of RFID tags:

\n\n

\n
b.
\n
\n

Answers may include:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: business, regulation, policies, privacy, anonymity, security, data, analytics, change, power, systems, values, ethics

\n

 

\n

Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "21N.1.SL.TZ0.2", "topics": [ "topic-3-content" ], "subtopics": [ "3-1-data", "3-2-algorithms" ] }, { "Question": "
\n

Wildfire modelling

\n

The fire control centre in the Kinakora National Park in New Zealand often has to cope with the natural phenomenon of wildfires. Staff have been collecting data about wildfires since 1970.

\n

The size of each wildfire is measured, and the vegetation types affected are recorded. Data on the weather conditions is collected from sensors in the park. The staff at the fire control centre use this information to fight the wildfire.

\n

A new computer modelling system is being developed using data collected from previous wildfires. This new system will improve the quality of the information available when fighting future wildfires.

\n

The new system will also enable staff at Kinakora National Park to send information to tourists in the park to warn them when they are in danger from a wildfire.

\n
\n

Identify two measurements that could be taken by the weather sensors in Kinakora National Park.

\n
[2]
\n
a.i.
\n
\n

Identify two methods that could be used to train the staff to use the new computer modelling system.

\n
[2]
\n
a.ii.
\n
\n

Identify two methods of visualization that could be used to present information from the new computer modelling system.

\n
[2]
\n
a.iii.
\n
\n

Two methods for informing tourists about wildfires in Kinakora National Park are:

\n\n

Analyse these two methods.

\n
[6]
\n
b.
\n
\n

Evaluate Kinakora National Park’s decision to use computer modelling to develop strategies for dealing with wildfires.  

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each measurement up to maximum of [2].

\n
a.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each method that could be used to train the staff to use the new modelling system up to maximum of [2].

\n
a.ii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each method of visualization up to maximum of [2].

\n
a.iii.
\n
\n

Answers may include:

\n

Advantages of using SMS texting:

\n\n

Disadvantages of using SMS texting:

\n\n

Advantages of using the Kinakora National Park website:

\n\n

Disadvantages of using the Kinakora National Park website:

\n\n

 

\n

Note: Many of the advantages of SMS text are automatically disadvantages of Kinakora National Park website or vice versa.

\n

\n

Keywords: connectivity, change, systems, values, ethics

\n
b.
\n
\n

Answers may include:

\n

Advantages of using computer models to develop strategies to deal with wildfires:

\n\n

Disadvantages of using computer models to develop strategies to deal with wildfires:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: environment, monitoring, data, GIGO, model, modelling, simulations, algorithms, change, systems, values, ethics

\n

 

\n

Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "19N.1.SL.TZ0.2", "topics": [ "topic-3-content", "topic-4-contexts" ], "subtopics": [ "3-1-data", "4-5-human-knowledge" ] }, { "Question": "
\n

Human genome research

\n

MediResearch, a US-based DNA testing company, has a relational database of human genome information. An individual’s genome data represents private information about their past, their present and, potentially, their future. This information is stored in a relational database.

\n

The senior managers at MediResearch are considering using data analytics but are concerned this may compromise the anonymity of the individuals who have provided their DNA.

\n
\n

Identify two features of a relational database.

\n
[2]
\n
a.i.
\n
\n

Identify two reasons why a relational database, rather than a flat-file database, is used to store the data for MediResearch.

\n
[2]
\n
a.ii.
\n
\n

Identify two features of data analytics.

\n
[2]
\n
a.iii.
\n
\n

MediResearch is looking to expand access to the genome data it holds by sharing it with other companies.

\n

Explain three strategies that MediResearch could use to ensure the security of the genome data.

\n
[6]
\n
b.
\n
\n

The chief executive officer of MediResearch is considering using cloud-based storage to store the genome data.  

\n

Discuss whether MediResearch should move to cloud-based storage.

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each feature of a relational database up to [2].

\n
a.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each reason why a relational database is used to store the data for MediResearch up to [2].

\n
a.ii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for each characteristic of data analytics identified up to [2].

\n
a.iii.
\n
\n

Answers may include:

\n\n\n\n\n\n\n

 

\n

Award [1] for identifying each policy and [1] for a development of the policy identified up to [2].

\n

Mark as [2] + [2] + [2].

\n
b.
\n
\n

Answers may include:

\n

Advantages of cloud-based storage:

\n\n

Disadvantages of cloud-based storage:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: health, policies, laws, regulations, data, security, privacy, anonymity, cloud, bandwidth, change, power, systems, values, ethics

\n

 

\n

Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "21N.1.SL.TZ0.3", "topics": [ "topic-3-content" ], "subtopics": [ "3-1-data" ] }, { "Question": "
\n

Investigation of ocean disasters

\n

A system called the Marine Accident Data Analysis Suite (MADAS) uses data collected from marine accidents to create models that are used as part of a simulation1 to help understand what has happened (see Figure 2).

\n

Figure 2: An example of a MADAS model

\n

\n


Cruise ships are required to carry a voyage data recorder (VDR), which uses sensors to monitor the conditions in the ship at all times. The data from the sensors is collected and input into a relational database2 (see Figure 3) that is a part of the MADAS system (see Figure 4).

\n

Figure 3: Part of the relational database in the MADAS system

\n

\n


Figure 4: The MADAS system

\n

\n

 

\n
\n

1 simulation: a computer simulation is the usage of a computer for the modelling of a real-world process or system

\n

2 relational database: a database that consists of one or more tables where there are pre-defined relationships between the data elements

\n


[Figure 2: With permission from the International Union of Marine Insurance. Source adapted.]

\n
\n

The voyage data recorder (VDR) gathers information during a voyage.

\n
\n

Identify three sensors that may be used to detect data about the weather conditions.

\n
[3]
\n
a.i.
\n
\n

Identify three advantages of using a relational database rather than a flat-file database.

\n
[3]
\n
a.ii.
\n
\n

There are concerns about the reliability of the data being input into the MADAS system.

\n

Explain why data validation and data verification are used to ensure the reliability of the data being input into the MADAS system.

\n
[3]
\n
b.i.
\n
\n

The MADAS system uses data visualization.

\n

Explain why data visualization is used by the MADAS system.

\n
[3]
\n
b.ii.
\n
\n

To what extent can the use of models and simulations like the MADAS system help prevent future accidents?

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each sensor that may be used to detect data about weather conditions up to a maximum of [3].

\n
a.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each advantage of a relational database rather than using a flat-file database up to [3].

\n
a.ii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for a definition of data validation.

\n

Award [1] for a definition of data verification.

\n

Award [1] for a statement that explains why both validation and verification is necessary.

\n
b.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying a reason why data visualization is used by the MADAS system and [1] for each subsequent development of that reason up to [3].

\n
b.ii.
\n
\n

Answers may include:

\n

Advantages:

\n\n


Disadvantages:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: transport, infrastructure, data, algorithm, accuracy, reliability, model, modelling, trainingenvironment, systems, ethics, values

\n


Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document
.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
b.i.
\n
\n[N/A]\n
b.ii.
\n
\n[N/A]\n
c.
\n
", "question_id": "22M.1.SL.TZ0.2", "topics": [ "topic-3-content" ], "subtopics": [ "3-3-computers", "3-1-data" ] }, { "Question": "
\n

Schools told not to use cloud computing software applications

\n


Schools in the German state of Hesse will no longer be able to use cloud computing services with software applications, such as G Suite and Office 365, due to new data protection rules. This has identified the risk of schools’ data being stored and accessed by third parties from outside of Germany.

\n

In contrast, many schools in other parts of the world use cloud computing services and software applications. These applications allow students to access software that was previously only installed on their computers.

\n
\n

Identify two types of cloud computing software applications that students might use at school.

\n
[2]
\n
a.i.
\n
\n

If the schools in Hesse can no longer use cloud computing software applications, they will need to store their data on a local file server and access it through a local area network (LAN).

\n

Identify two ways in which data could be secured if the school stored it locally.

\n
[2]
\n
a.ii.
\n
\n

Identify two ways in which students could authenticate themselves on their local area network (LAN).

\n
[2]
\n
a.iii.
\n
\n

The European Union’s (EU) General Data Protection Regulation (GDPR) governs data protection and privacy in the EU. Its regulations give users certain rights in terms of their data.

\n

Explain three principles that should be included in data protection regulations such as GDPR.

\n
[6]
\n
b.
\n
\n

A new school has opened in Switzerland, and its principal and IT manager are considering two options:

\n

Option 1: Using a local client–server network.

\n

Option 2: Using a cloud-based service.

\n

Evaluate these two options.

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each application up to [2].  

\n

Note to examiners:
DO NOT accept Microsoft Office / Office 365 / Google Workspace / Gsuite as these are mentioned in the stimulus materials on the question paper.

\n
a.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each way the data can be stored securely up to [2].

\n
a.ii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each way in which students could authenticate themselves on their local area network (LAN), up to [2].

\n
a.iii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying a principle that should be included in data regulation principles such as GDPR and [1] for a development up to [2].

\n

Mark as [2] + [2] + [2].

\n
b.
\n
\n

Answers may include:

\n

 

\n

Option 1:

\n

Advantages

\n\n

Disadvantages

\n\n

 

\n

Option 2:

\n

Advantages

\n\n

Disadvantages

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: education, data, security, reliability, network, cloud, client, server, systems, ethics, values, cost, feasibility

\n


Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document
.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "22M.1.SL.TZ0.3", "topics": [ "topic-3-content", "topic-1-introduction", "topic-2-concepts" ], "subtopics": [ "3-4-networks-and-the-internet", "3-1-data", "1-1-what-is-digital-society", "2-1-change" ] }, { "Question": "
\n

China's social credit scheme

\n


The Chinese government is proposing a social credit scheme that will reward its citizens with points for what it considers to be good behaviour. This can be done by monitoring citizens’ social media connections, purchasing history and location data.

\n

CCTV cameras are widely used in China, and there are concerns that facial recognition technology that uses artificial intelligence (AI) is already being utilized by the government to detect “good” and “bad” behaviours of its citizens. The facial recognition system requires high-resolution images*.

\n
\n

* high-resolution images: images that are of a quality that allows them to be used for printing. Usually this means they are 300 pixels per inch.

\n
\n

Identify two types of image file.

\n
[2]
\n
a.i.
\n
\n

Describe the difference between monitoring and surveillance.

\n
[2]
\n
a.ii.
\n
\n

Describe the difference between identification and authentication.

\n
[2]
\n
a.iii.
\n
\n

Other governments are considering setting up similar systems that will use facial recognition to gather information about the behaviour of its citizens.

\n

Explain why the developers of the new facial recognition system would need both primary and secondary data collection.

\n
[3]
\n
b.i.
\n
\n

Explain why using high-resolution images could be a challenge to the implementation of a facial recognition system.

\n
[3]
\n
b.ii.
\n
\n

Discuss the advantages and disadvantages of a government using a facial recognition system that uses artificial intelligence (AI) to monitor the behaviour of its citizens.

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each file type up to [2].

\n
a.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for a definition of monitoring.
Award [1] for a definition of surveillance.

\n
a.ii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for a definition of identification.
Award [1] for a definition of authentication.

\n
a.iii.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying a reason why the developers of the new facial recognition system would need both primary and secondary data collection and [1] for each subsequent development of that reason, up to [3].

\n
b.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying a reason why having images with a higher resolution could be a challenge to the implementation of a facial recognition system and [1] for each subsequent development of that reason up to [2].

\n
b.ii.
\n
\n

Answers may include:

\n

Advantages:

\n\n


Disadvantages:
·     

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: government, data, algorithm, accuracy, reliability, model, monitoring, surveillance, power, systems, ethics, values, trust, accountability, cost, feasibility

\n


Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document
.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
a.iii.
\n
\n[N/A]\n
b.i.
\n
\n[N/A]\n
b.ii.
\n
\n[N/A]\n
c.
\n
", "question_id": "22M.1.SL.TZ0.4", "topics": [ "topic-3-content" ], "subtopics": [ "3-1-data", "3-4-networks-and-the-internet", "3-5-media" ] }, { "Question": "
\n

Cameras in school

\n

The principal at Flynn School has received requests from parents saying that they would like to monitor their children’s performance in school more closely. He is considering extending the school’s IT system by installing cameras linked to facial recognition software that can record student behaviour in lessons.

\n

The facial recognition software can determine a student’s attention level and behaviour, such as identifying if they are listening, answering questions, talking with other students, or sleeping. The software uses machine learning to analyse each student’s behaviour and gives them a weekly score that is automatically emailed to their parents.

\n

The principal claims that monitoring students’ behaviour more closely will improve the teaching and learning that takes place.

\n

Discuss whether Flynn School should introduce a facial recognition system that uses machine learning to analyse each student’s behaviour and give them a score that is automatically emailed to their parents.

\n
", "Markscheme": "
\n

Answers may include:

\n

Advantages of implementing the facial recognition system:

\n\n

Disadvantages of implementing the facial recognition system: 

\n\n

 

\n

In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.

\n

Keywords: education, acceptability, cost, anonymity, surveillance, privacy, algorithms, change, power, systems, values, ethics

\n


Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "22M.1.HL.TZ0.5", "topics": [ "topic-2-concepts" ], "subtopics": [ "2-1-change" ] }, { "Question": "
\n

Robotic Surgery

\n

Sandy Parkar, the manager of a large hospital, is considering using robots controlled by surgeons to carry out surgical procedures. The surgeon uses a computer console to control the robot (see Figure 5).

\n


Figure 5: Robotic surgery

\n

\n

[Source: mathisworks / iStock.]

\n


All the robot’s movements, and the surgical procedure, are recorded. This allows information to be collected about each procedure.

\n

In 2022, a patient died while undergoing a surgical procedure in which a surgical robot was used. Sandy claims the manufacturer of the robot should be accountable. This was contested by the manufacturer, and a court case followed to determine who was accountable.  

\n

Discuss whether the surgeon, the manufacturer of the surgical robot, or the hospital manager should be held accountable.

\n
", "Markscheme": "
\n

Answers may include:

\n

The surgeon is accountable if:

\n\n

The manufacturer of the surgical robot is accountable if:

\n\n

The hospital manager is accountable if:

\n\n

 

\n

In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.  

\n

Keywords: health, training, data, cost, reliability, accountability, privacy, change, power, systems, values, ethics

\n


Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n

 

\n
", "Examiners report": "
\n[N/A]\n
", "question_id": "22M.1.HL.TZ0.6", "topics": [ "topic-5-hl-extension" ], "subtopics": [ "5-1-global-well-being" ] }, { "Question": "
\n

The role of portable digital devices in health

\n

Jaime is an athlete and uses his sports watch to monitor his training sessions. He also uses it to keep a record of his health and well-being. The sports watch can monitor Jaime’s vital signs. It is also global positioning systems (GPS) enabled, so it can track his location (see Figure 4).

\n


Figure 4: Data collected by a sports watch

\n

\n

The information that is recorded by Jaime’s sports watch is synchronized with a mobile application (app) installed on his cellphone/mobile phone.

\n
\n

Identify two vital signs that can be recorded by Jaime’s sports watch.

\n
[2]
\n
a.i.
\n
\n

Identify the steps that the GPS receiver in Jaime’s sports watch uses to show the routes of his training runs.

\n
[4]
\n
a.ii.
\n
\n

Jaime has decided to share his personal health information with researchers at the University of Sierra Nevada.

\n

Analyse Jaime’s decision to share his personal health information with the University of Sierra Nevada.

\n
[6]
\n
b.
\n
\n

The development of mobile health apps has changed the way citizens manage their own health and well-being.

\n

Discuss whether citizens like Jaime should rely only on the advice of a health app to manage their own health and well-being.

\n
[8]
\n
c.
\n
", "Markscheme": "
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each vital sign, up to a maximum of [2].

\n
a.i.
\n
\n

Answers may include:

\n\n

 

\n

Award [1] for identifying each step that global positioning systems (GPS) follow to give an accurate location, up to maximum of [4].

\n
a.ii.
\n
\n

Answers may include:

\n

Reasons for sharing his personal health information:

\n\n

Reasons for not sharing his personal health information:

\n\n

 

\n

Keywords: health, data, security, trust, values, ethics, security, anonymity, privacy, change, systems, values, ethics, accountability

\n
b.
\n
\n

Answers may include:

\n

Reasons why citizens like Jaime should only rely on the recommendations of the health app: 

\n\n

Reasons why citizens like Jaime should not rely only on the recommendations of the health app:

\n\n

 

\n

In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.  

\n

Keywords: health, data, trust, judgement, values, ethics, anonymity, privacy, monitoring, algorithm, change, systems, power, values, ethics

\n


Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.

\n
c.
\n
", "Examiners report": "
\n[N/A]\n
a.i.
\n
\n[N/A]\n
a.ii.
\n
\n[N/A]\n
b.
\n
\n[N/A]\n
c.
\n
", "question_id": "20N.1.SL.TZ0.3", "topics": [ "topic-3-content", "topic-2-concepts" ], "subtopics": [ "3-1-data", "3-2-algorithms", "2-1-change" ] } ]