[
{
"Question": "
\n
RESOURCE BOOKLET: Implanted microchips
\n
Source A: Graphic
\n

\n
Source B: Series of message posts
Posts from award-winning tech influencer and blogger @richtech
\n

\n
Source C: Article – Bans on microchipping employees
\n
Many countries are passing laws that prohibit companies from requiring employees to have a device such as microchip or radio frequency identification device (RFID) tag implanted into their bodies as a condition of employment.
\n
Employees can still be microchipped if they volunteer to do so. Tech4All, a technology company, has microchipped more than 50 of its employees. The company claims the microchips help people to open building doors, access their computers, and pay for items in the company restaurant.
\n
It takes 40–60 days for the chip to settle under the skin. During this period, it can itch, and scratching is discouraged as it could dislodge the chip. The chips are relatively durable and will handle most bumps, but extreme pressure has been known to shatter them. The chips do not heat up or explode when anywhere near airport security scanners, but they may fail after a magnetic resonance imaging (MRI) scan.
\n
Source D
\n
Biohacking is the next stage in human evolution. Biohackers can optimize their bodies with a combination of gadgets, microchip implants, diets, or anything else they can put into their body to make it work better. The use of microchip implants is also an extension of the concept of the Internet of Things (IoT). By 2030, it is estimated that there will be more than 75 billion connected devices.
\n
Microchips have been used in pets as form of identification to quickly reunite owners with lost or injured pets. Now, microchipping is being considered for the tracking of individuals like the elderly, those with memory loss, and prisoners.
\n
Supporters of microchip implants say they are safe and can be protected from being hacked. However, there are privacy concerns about the data transmitted from or stored on the microchip. These concerns go beyond those associated with location tracking.
\n
\n
Compare and contrast what Source C and Source D reveal about the implanting of microchips in humans.
\n
",
"Markscheme": "\n
Answers may include:
\n
Physical safety/health:
\n
\n- Source C warns users of the risks of the microchip implant, such as shattering due to force, whereas Source D acknowledges the safety of the microchip implants that have been used for years in pets.
\n
\n
Data privacy:
\n
\n- Source D introduces the concept of tracking through RFID implants, whereas in Source C, RFID is used for I&A and some employees have concerns about how data is being used, so an assumption would be made that data is collected at points where employees authenticate/identify themselves in locations at work.
\n- \nBoth sources raise privacy concerns about the use of the data; Source C focuses on the personal data of employees, whereas Source D highlights privacy concerns of personal data being hacked and/or being mined for economic gain (profiling and consumer analysis).
\n
\n
Benefits of use/ease of access:
\n
\n- Source C provides examples of the ease of use to open doors and access computers. Likewise, Source D provides examples of tracking pets and potentially people in the future.
\n
\n
Legal issues:
\n
\n- Source C emphasizes the rights of the employees and protects them from mandatory implants, whereas Source D views it as the next step since it is already being used in pets.
\n
\n
Acceptance:
\n
\n- Source D notes that acceptance rates are low, with 66% of those polled saying they would not be chipped, whereas Source C notes that over 75% of employees have been chipped. This suggests that people may change their opinion/acceptance when offered the opportunity.
\n- \nBoth sources suggest that the use of microchip implants may increase in the future. Source C notes that, despite the introduction of laws, employees can have implants voluntarily; likewise, Source D suggests that implants are being considered for future use.
\n
\n
Identification:
\n
\n- Both sources state that RFID can be used to establish identity. Source C provides examples that extend to authentication, whereas Source D limits this to identification only, such as pets, the elderly, people with memory loss, and criminals.
\n
\n
Concerns:
\n
\n- \nBoth sources outline concerns with the technology. Source C notes employee concerns about how the data is used, pressure to be chipped, and countries introducing laws about usage; Source D notes concerns about privacy and the idea of an implant being disturbing. This suggests that there are a range of issues surrounding the use of this technology that need to be resolved before it is socially accepted.
\n
\n

\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "19M.2.SL.TZ0.3",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-1-data"
]
},
{
"Question": "\n
RESOURCE BOOKLET: Implanted microchips
\n
Source A: Graphic
\n

\n
Source B: Series of message posts
Posts from award-winning tech influencer and blogger @richtech
\n

\n
Source C: Article – Bans on microchipping employees
\n
Many countries are passing laws that prohibit companies from requiring employees to have a device such as microchip or radio frequency identification device (RFID) tag implanted into their bodies as a condition of employment.
\n
Employees can still be microchipped if they volunteer to do so. Tech4All, a technology company, has microchipped more than 50 of its employees. The company claims the microchips help people to open building doors, access their computers, and pay for items in the company restaurant.
\n
It takes 40–60 days for the chip to settle under the skin. During this period, it can itch, and scratching is discouraged as it could dislodge the chip. The chips are relatively durable and will handle most bumps, but extreme pressure has been known to shatter them. The chips do not heat up or explode when anywhere near airport security scanners, but they may fail after a magnetic resonance imaging (MRI) scan.
\n
Source D
\n
Biohacking is the next stage in human evolution. Biohackers can optimize their bodies with a combination of gadgets, microchip implants, diets, or anything else they can put into their body to make it work better. The use of microchip implants is also an extension of the concept of the Internet of Things (IoT). By 2030, it is estimated that there will be more than 75 billion connected devices.
\n
Microchips have been used in pets as form of identification to quickly reunite owners with lost or injured pets. Now, microchipping is being considered for the tracking of individuals like the elderly, those with memory loss, and prisoners.
\n
Supporters of microchip implants say they are safe and can be protected from being hacked. However, there are privacy concerns about the data transmitted from or stored on the microchip. These concerns go beyond those associated with location tracking.
\n
\n
To what extent do you agree that the advantages of implanting microchips in humans outweigh the concerns? Use all the sources and your own knowledge.
\n
",
"Markscheme": "\n
Answers may include:
\n
Advantages:
\n
Can enhance daily life:
\n
\n- Easy access to unlock doors/locations (Source, A, B), pay for food (Source A).
\n- Examples beyond sources may include:\n
\n- data on RFID could be matched to health data: allergies, medicines, vaccines (values and ethics)
\n- can be scanned if unconscious/unable to communicate (systems).
\n
\n \n
\n
Used for identification:
\n
\n- No need to carry ID, can't lose your ID (Source B) (systems).
\n- Can authenticate an employee’s identity (all sources), including pets, people.
\n- Examples beyond sources may include:\n
\n- preventing mix-ups, such as with newborn babies
\n- improvement in work performance.
\n
\n \n
\n
Theft prevention:
\n
\n- I&A highly reliable (Source C) (systems).
\n- No need to memorize passwords.
\n- Examples beyond sources may include:\n
\n- swipe cards/keys can be lost or stolen.
\n
\n \n
\n
Safe to use
\n
\n- Pets are already microchipped and this is socially accepted (Source D) (values and ethics).
\n- Health/biosafety concerns (Source C).
\n
\n
Concerns:
\n
Legal:
\n
\n- \nLaws need to be written to accept the implants (Source C) (power).
\n- \nLaws prohibit enforcing mandating the use of microchip (power).
\n- What policies do organizations need to implement this practice (values and ethics)?
\n
\n
Health:
\n
\n- Health/biosafety concerns (Source C), such as chips may shatter, chips may dislodge (systems).
\n- Examples beyond sources may include:\n
\n- uncertainty of long-term health impacts
\n- bodily migration – could move around the body
\n- mental health/psychological issues resulting from concerns from implants.
\n
\n \n
\n
Privacy:
\n
\n- \nPrivacy/anonymity concerns need to be addressed (Source D).
\n- Who owns the data on the chip (power)?
\n- Who has access to the data and how (power)?
\n- Is the chip a form of surveillance (values and ethics)?
\n- Who is accountable if a data leak occurs?
\n
\n
Security:
\n
\n- Can the chips be hacked (Source D)? What security is in place to stop unauthorized access to data and manipulation of data (systems)?
\n- Do the chips communicate, somehow, with outside networks / are they secure (systems)?
\n
\n
Implementation and reliability:
\n
\n- Cost – both the implants and the infrastructure/RFID readers.
\n- \nCompatibility/interoperability issues due to lack of universal standards; new technologies for access may not be compatible.
\n- Hardware replacement: will new features require new hardware that is not easy to replace?
\n- How are chips updated when flaws are found?
\n
\n
Social acceptance:
\n
\n- Low social acceptance (Source D).
\n- Examples beyond sources may include:\n
\n- religious objections to implants/do religious beliefs forbid the practice (values and ethics)?
\n- are incentives provided to those that participate (values and ethics)?
\n- digital divide: will non-participants be disadvantaged?
\n- will implants be truly voluntary in the future (values and ethics)?
\n
\n \n
\n
\n
Keywords: health, business, employment, health, laws, policies, regulations, implanted technologies, privacy, anonymity, surveillance, monitoring, compatibility, interoperability, wearable devices, security, authentication, accountability, reliability, acceptance, change, identity, power, systems, values and ethics
\n
\n
Refer to SL/HL paper 2 question 4 markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "19M.2.SL.TZ0.4",
"topics": [
"topic-2-concepts"
],
"subtopics": [
"2-1-change"
]
},
{
"Question": "\n
Resource booklet: Responsible mobile device usage
\n
Source A
\n

\n

\n
Source B
\n
Data from two separate samples of teenagers aged 13 to 16. The samples were taken in the USA and included 1014 participants in 2013 and 1215 in 2019.
\n

\n
Source C
\n
The Family Sense app (see Figure 1) is designed to make families aware of how long they spend interacting with their mobile devices and encourage them to limit their screen time.
\n
Figure 1: The Family Sense app
\n

\n
The app collects information from each device. It logs data, such as how many times the device has been picked up, which apps are most frequently used, and how much overall time is spent on the device. This information is stored on the device and shared with all the family.
\n
The Family Sense app allows daily limits to be set for each family member. It also allows anyone in the family to enforce a one-hour period of screen-free time. People can still make and receive telephone calls, listen to music, etc., with their screens turned off, but the device will make a loud alarm sound if they try to use it for anything else.
\n
Source D
\n
Extract from a school newsletter to parents and caregivers on responsible mobile phone use for children and teenagers
\n
Dear parents and caregivers,
\n
If your child has a mobile phone, we encourage you to discuss and agree on mobile phone usage rules that focus on safety issues and healthy habits. Some discussion points you might consider are:
\n
\n- cyberbullying
\n- using social media
\n- access to unsuitable content on the internet
\n- only responding to known phone numbers/callers
\n- sharing of personal information or images
\n- screen-free time
\n- data usage.
\n
\n
Respectfully,
\n
Principal Zhang
\n
\n
Identify two trends of social media usage that can be seen in Source A.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Increased from 1:29 in 2013 to 2:25 in 2019.
\n- Usage ranges from 1:55 in Europe to 3:31 in South America.
\n- Usage ranges from those over the age of 55 with the lowest use (1:15) to those aged 16–24 with the highest usage (3:05 hours).
\n
\n
Award [1] for each relevant trend up to [2] marks.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "18M.2.SL.TZ0.1",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-4-networks-and-the-internet"
]
},
{
"Question": "\n
Resource booklet: Responsible mobile device usage
\n
Source A
\n

\n

\n
Source B
\n
Data from two separate samples of teenagers aged 13 to 16. The samples were taken in the USA and included 1014 participants in 2013 and 1215 in 2019.
\n

\n
Source C
\n
The Family Sense app (see Figure 1) is designed to make families aware of how long they spend interacting with their mobile devices and encourage them to limit their screen time.
\n
Figure 1: The Family Sense app
\n

\n
The app collects information from each device. It logs data, such as how many times the device has been picked up, which apps are most frequently used, and how much overall time is spent on the device. This information is stored on the device and shared with all the family.
\n
The Family Sense app allows daily limits to be set for each family member. It also allows anyone in the family to enforce a one-hour period of screen-free time. People can still make and receive telephone calls, listen to music, etc., with their screens turned off, but the device will make a loud alarm sound if they try to use it for anything else.
\n
Source D
\n
Extract from a school newsletter to parents and caregivers on responsible mobile phone use for children and teenagers
\n
Dear parents and caregivers,
\n
If your child has a mobile phone, we encourage you to discuss and agree on mobile phone usage rules that focus on safety issues and healthy habits. Some discussion points you might consider are:
\n
\n- cyberbullying
\n- using social media
\n- access to unsuitable content on the internet
\n- only responding to known phone numbers/callers
\n- sharing of personal information or images
\n- screen-free time
\n- data usage.
\n
\n
Respectfully,
\n
Principal Zhang
\n
\n
Mobile devices provide many benefits for children but can also be used inappropriately. Some groups claim it is the responsibility of parents to ensure their children use their mobile devices responsibly, while other groups claim that responsibility lies with other stakeholders, such as schools.
\n
With reference to all the sources and your own knowledge, to what extent do you agree that parents should be responsible for ensuring their children develop safe and healthy habits for mobile device usage?
\n
",
"Markscheme": "\n
Answers may include:
\n
Role of parents:
\n
\n- Setting/negotiating limits, goals (Source C and D).
\n- Following through with consequences, responsibility.
\n- Modelling good practice by moderating their usage in front of their children (Source A and B).
\n- Use of technology-based solutions as noted in Source C.
\n- Setting boundaries and promoting non-technology activities, e.g., screen-free evenings/holidays, charging overnight in a common space (Source C and D).
\n- \nControlling access through data plans and encouraging children to pay for their own data after the limit has been reached (responsibility, accountability).
\n- Watching for warning signs, including spending too much time alone, not getting enough sleep, worse physical health, and not taking part in healthy activities (mental health).
\n
\n
Role of schools:
\n
\n- \nPolicies may ban/restrict/monitor the use of social media/mobile phones to encourage face-to-face communication (Source B).
\n- May have clear and consistent policies/guidelines/consequences for use, e.g., in class only for educational use.
\n- Promote the educational use of mobile devices, e.g., educational apps, time management, self-management, podcasts.
\n- Online safety as part of a pastoral programme/curriculum (education).
\n
\n
Responsibility of other stakeholders
Role of government:
\n
\n- Not all parents are aware of safety issues and need to be educated themselves (education). Governments could play a role with campaigns/laws to raise awareness targeted at parents (Source A).
\n- National campaigns targeted at children for alternatives to phone usage/social media (Source A and B).
\n- Changes in laws, such as increase in age for access to social media sites (e.g., COPPA).
\n- Healthcare funding for research into and support for addiction/mental health.
\n
\n
Role of social media companies:
\n
\n- Accounts may need to have more rigorous age-verification methods before usage.
\n- Activate time limits settings in apps such as Facebook and Instagram.
\n- Mobile devices can track/monitor usage such as screen time, apps used.
\n- Analyse data collected to provide insights that may be used to improve/promote safety and healthy habits (digital literacy).
\n
\n
\n
Marking notes: It is not necessary to explicitly refer to each source to achieve the highest mark band, but there must be an explicit reference to at least two sources. To achieve the highest markband the sources must be synthesized in an integrated manner rather than a systematic analysis of each individual source.
\n
\n
Keywords: education, responsibility, accountability, privacy, anonymity, monitoring, surveillance, apps, social media, regulations, policies, laws, health, addiction, mental well-being, change, power, systems, ethics, values
\n
\n
Refer to SL/HL paper 2 question 4 markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "18M.2.SL.TZ0.4",
"topics": [
"topic-2-concepts"
],
"subtopics": [
"2-1-change"
]
},
{
"Question": "\n
Resource booklet: Responsible mobile device usage
\n
Source A
\n

\n

\n
Source B
\n
Data from two separate samples of teenagers aged 13 to 16. The samples were taken in the USA and included 1014 participants in 2013 and 1215 in 2019.
\n

\n
Source C
\n
The Family Sense app (see Figure 1) is designed to make families aware of how long they spend interacting with their mobile devices and encourage them to limit their screen time.
\n
Figure 1: The Family Sense app
\n

\n
The app collects information from each device. It logs data, such as how many times the device has been picked up, which apps are most frequently used, and how much overall time is spent on the device. This information is stored on the device and shared with all the family.
\n
The Family Sense app allows daily limits to be set for each family member. It also allows anyone in the family to enforce a one-hour period of screen-free time. People can still make and receive telephone calls, listen to music, etc., with their screens turned off, but the device will make a loud alarm sound if they try to use it for anything else.
\n
Source D
\n
Extract from a school newsletter to parents and caregivers on responsible mobile phone use for children and teenagers
\n
Dear parents and caregivers,
\n
If your child has a mobile phone, we encourage you to discuss and agree on mobile phone usage rules that focus on safety issues and healthy habits. Some discussion points you might consider are:
\n
\n- cyberbullying
\n- using social media
\n- access to unsuitable content on the internet
\n- only responding to known phone numbers/callers
\n- sharing of personal information or images
\n- screen-free time
\n- data usage.
\n
\n
Respectfully,
\n
Principal Zhang
\n
\n
Suggest two reasons why there has been a significant decrease in in-person communication with teenagers between 2013 and 2019 in Source B.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Increase in number of friends on social media due to social media being more widely available.
\n- Increase in friends in different countries/time zones due to increased coverage worldwide of social media sites.
\n- Increase in friends in different countries/cultures due to the use of translation tools for communication in multiple languages.
\n- Increase in access to mobile technology due to the decrease in cost of phones/data.
\n- Increase in use of asynchronous communication methods as asynchronous communication has become more socially acceptable.
\n- More people to communicate with due to the increase in number of people in 2018 with access to mobile technology/social media.
\n- Increase in number of ways to communicate in addition to in-person, which allows people who were previously unable to communicate to hold discussions.
\n
\n
Award [1] for identifying each reason why there has been a significant decrease in in-person communication with teens from 2012 to 2018 and [1] for a development of that reason up to [2] marks. Award a maximum [4] marks.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "18M.2.SL.TZ0.2",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-5-media"
]
},
{
"Question": "\n
Resource booklet: Responsible mobile device usage
\n
Source A
\n

\n

\n
Source B
\n
Data from two separate samples of teenagers aged 13 to 16. The samples were taken in the USA and included 1014 participants in 2013 and 1215 in 2019.
\n

\n
Source C
\n
The Family Sense app (see Figure 1) is designed to make families aware of how long they spend interacting with their mobile devices and encourage them to limit their screen time.
\n
Figure 1: The Family Sense app
\n

\n
The app collects information from each device. It logs data, such as how many times the device has been picked up, which apps are most frequently used, and how much overall time is spent on the device. This information is stored on the device and shared with all the family.
\n
The Family Sense app allows daily limits to be set for each family member. It also allows anyone in the family to enforce a one-hour period of screen-free time. People can still make and receive telephone calls, listen to music, etc., with their screens turned off, but the device will make a loud alarm sound if they try to use it for anything else.
\n
Source D
\n
Extract from a school newsletter to parents and caregivers on responsible mobile phone use for children and teenagers
\n
Dear parents and caregivers,
\n
If your child has a mobile phone, we encourage you to discuss and agree on mobile phone usage rules that focus on safety issues and healthy habits. Some discussion points you might consider are:
\n
\n- cyberbullying
\n- using social media
\n- access to unsuitable content on the internet
\n- only responding to known phone numbers/callers
\n- sharing of personal information or images
\n- screen-free time
\n- data usage.
\n
\n
Respectfully,
\n
Principal Zhang
\n
\n
Compare and contrast the effectiveness of the approaches outlined in Source C and Source D towards the responsible use of mobile devices.
\n
",
"Markscheme": "\n
Answers may include:
\n
Type of solution:
\n
\n- Source C is a technology-based intervention where the usage can be controlled by the app, whereas Source D is a non-technological intervention where the use is controlled by the user. Which may be more effective in promoting responsible use?
\n
\n
Agency:
\n
\n- Source D encourages input from family members for setting rules; likewise, source C provides data for family discussions and allows anyone to enforce screen-free time. In both cases, each family member has agency in the solution.
\n
\n
Ease of use:
\n
\n- Source C requires parents to configure the app, and this may not be done correctly so less effective; likewise, the rules created by families (Source D) may not be complete/have gaps/not deal with all eventualities and therefore be less effective.
\n
\n
Monitoring:
\n
\n- Source C provides evidence of usage, which could lead the discussions on responsible use and rule setting, whereas Source D relies on self-reporting for the discussion and negotiation of rules only with no hard data to determine the effectiveness of the rules.
\n
\n
Data collection:
\n
\n- The app in Source C could share data/behaviours/insights that may be used to improve/determine the effectiveness of the solution, whereas there is no tangible and immediate method of data collection for third parties in Source D.
\n
\n

\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "18M.2.SL.TZ0.3",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-5-media"
]
},
{
"Question": "\n
Sentencing criminals using artificial intelligence (AI)
\n
In 10 states in the United States, artificial intelligence (AI) software is used for sentencing criminals. Once criminals are found guilty, judges need to determine the lengths of their prison sentences. One factor used by judges is the likelihood of the criminal re-offending*.
\n
The AI software uses machine learning to determine how likely it is that a criminal will re-offend. This result is presented as a percentage; for example, the criminal has a 90 % chance of re-offending. Research has indicated that AI software is often, but not always, more reliable than human judges in predicting who is likely to re-offend.
\n
There is general support for identifying people who are unlikely to re-offend, as they do not need to be sent to prisons that are already overcrowded.
\n
Recently, Eric Loomis was sentenced by the state of Wisconsin using proprietary AI software. Eric had to answer over 100 questions to provide the AI software with enough information for it to decide the length of his sentence. When Eric was given a six-year sentence, he appealed and wanted to see the algorithms that led to this sentence. Eric lost the appeal.
\n
On the other hand, the European Union (EU) has passed a law that allows citizens to challenge decisions made by algorithms in the criminal justice system.
\n
\n
* re-offending: committing another crime in the future
\n
\n
Identify two characteristics of artificial intelligence (AI) systems.
\n
[2]
\n
a.i.
\n
\n
Outline one problem that may arise if proprietary software rather than open-source software is used to develop algorithms.
\n
[2]
\n
a.ii.
\n
\n
The developers of the AI software decided to use supervised machine learning to develop the algorithms in the sentencing software.
\n
Identify two advantages of using supervised learning.
\n
[2]
\n
a.iii.
\n
\n
The developers of the AI software used visualizations as part of the development process.
\n
Explain one reason why visualizations would be used as part of the development process.
\n
[2]
\n
b.i.
\n
\n
Explain two problems the developers of the AI system could encounter when gathering the data that will be input into the AI system.
\n
[4]
\n
b.ii.
\n
\n
To what extent should the decisions of judges be based on algorithms rather than their knowledge and experience?
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Ability to seem intelligent
\n- Power to copy intelligent human behaviour
\n- Capacity to learn
\n- Decision-making ability
\n- Adaptation to circumstances
\n- Well-defined goals
\n- Problem-solving skills
\n- Reasoning ability
\n- Autonomy
\n- Flexibility
\n
\n
Award [1] for identifying each characteristic of artificial intelligence systems up to a maximum of [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- Proprietary software cannot be easily adapted to the needs of the user.
\n- Changes to the software may take a long time / may not meet the needs of the user / may be driven by commercial interests.
\n
\n
Award [1] for identifying a problem of using proprietary software and [1] for a development of that problem up to a maximum of [2].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- More accurate (than unsupervised and reinforcement learning).
\n- Easier to compare outcomes to predicted results / easier to train the algorithms.
\n
\n
Award [1] for identifying each advantage of using supervised learning up to a maximum of [2].
\n
a.iii.
\n
\n
Answers may include:
\n
\n- Visualizes the flow of data through an information system…
\n- which could make a potentially complex system understandable by a non-technical audience.
\n
\n
Award [1] for identifying a reason why visualizations may be used as part of the development process and [1] for a development of that reason up to a maximum of [2].
\n
b.i.
\n
\n
Answers may include:
\n
\n- The different datasets may not be compatible with each other…
\n- which means it has to be converted to a single format.
\n
\n
\n
\n- The various databases may have different structures…
\n- fields in one database may not correspond to fields in other databases / a lot of the integrated data is of no value.
\n
\n
Award [1] for identifying a problem the developers of the AI system will encounter when gathering the data that will be input into the AI system and [1] for a development of that reason up to a maximum of [2].
\n
b.ii.
\n
\n
Answers may include:
\n
Arguments for using algorithms
\n
\n- We don’t know what is going on inside a judge’s mind, so it’s a black box too.
\n- Judges can be biased.
\n- This would be a more standardized process, i.e., more uniform and logical.
\n- Risk assessment tools could lead to less incarceration and less crime.
\n- This software could be used in conjunction with a judge’s decision i.e., to provide guidance.
\n- It could be one factor among many, i.e., not the determinative factor.
\n- The software could be used to identify outliers, i.e., people very likely to commit a crime or people very unlikely to commit a crime.
\n- The software could be based on the experience of many judges/experienced experts in this field, so it could be more reliable than the judgement of a single person.
\n
\n
Arguments against using algorithms
\n
\n- The algorithms should not be “black boxes”, i.e., they should be revealed (transparency).
\n- It’s almost impossible to define fairness, so how can the algorithm be fair?
\n- \nBiases could be incorporated into the software because of the attitudes of the human beings who created it.
\n- The value of the algorithm depends on the data it uses, and criminal justice data is often unreliable.
\n- Algorithms look at group behaviour, not individual behaviour.
\n- Algorithms don’t look at how different factors interact (at least not yet).
\n- Is the AI system fit for purpose, will it give appropriate sentences?
\n- May shift the power too far towards AI / machine learning.
\n- Does not determine who is accountable if a sentence is unjust / inappropriate.
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: laws, standardized, transparency, accountability, judgement, bias, fairness, automation, machine learning, algorithm, reliability, change, power, systems, values
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "19M.1.SL.TZ0.4",
"topics": [
"topic-2-concepts",
"topic-3-content"
],
"subtopics": [
"2-1-change",
"3-6-artificial-intelligence",
"3-2-algorithms",
"3-1-data"
]
},
{
"Question": "\n
How to appropriately interact in an online environment
\n
Increasing numbers of parents are claiming digital technologies that monitor online activities are the best way to protect their children from offensive content. A number of companies, such as mSpy and Qustodio, have developed online monitoring apps.
\n
Other parents claim it is not necessary to monitor their children’s online behaviour, preferring to encourage their children to develop the knowledge and skills to make appropriate choices.
\n
Parents can consider two different interventions to ensure their children use the online environment appropriately:
\n
\n- Monitor their children’s online behaviour using apps
\n- Encourage their children to develop the knowledge and skills to use the online environment and make appropriate choices.
\n
\n
With reference to real-life scenarios, evaluate these two interventions.
\n
",
"Markscheme": "\n
Answers may include:
\n
Intervention 1: Online monitoring (claim)
\n
Advantages of monitoring online behaviour using apps:
\n
\n- Safety from exposure to inappropriate/offensive/objectionable content and interactions with people that have not been approved by the parent (online predators, etc).
\n- Monitor interactions between the child’s social groups (e.g., online bullying / transparency).
\n- Monitor time usage to ensure the child is not spending too much time online.
\n
\n
Disadvantages of monitoring online behaviour using apps:
\n
\n- Children may not know that their parents monitor their messages and online activities, which can be detrimental to trust and relationships within the family (ethics, values).
\n- \nTrust issues from parental control may lead to the child seeking other online avenues behind their parents’ backs. Where does the power lie?
\n- Children have a right to privacy, which these apps refute and deny (ethics, values).
\n- Younger children may need to be protected, but teenagers may feel they have a right to exchange messages in confidentiality (transparency) with other people without their parents spying on them.
\n- The use of apps could involve data being sent to the app developers. which potentially introduces new privacy issues (transparency).
\n- The apps can be costly.
\n- Does not prepare the child for later life.
\n
\n
\n
Intervention 2: Developing online knowledge and skills (counter-claim)
\n
Advantages of encouraging the development of online skills (claims supporting the intervention):
\n
\n- Develops lifelong skills/values that stay with the child into adulthood.
\n- Promotes trust between parent and child (ethics, values).
\n
\n
Disadvantages of encouraging the development of knowledge and online skills:
\n
\n- May be inappropriate for younger children, who are not mature enough to make appropriate choices in the complex online environment (acceptability, ethics, values).
\n- Developing skills/[ethical]values is a learning curve and mistakes may still be made, the consequences of which may be the safety of the child (i.e., online predators/cyberbullying), security (i.e., downloading a virus or malware), or cost (i.e., in-app purchases).
\n- The online environment is constantly changing, and parents would have to ensure that they are up to date with good safety practices to ensure they are giving the best advice (ethics, values).
\n
\n
\n
In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: home, online, health, social, family, relationships, trust, advice, software applications, apps, offensive, inappropriate, objectionable, content, change, expression, transparency, identity, power, ethics, values
\n
\n
Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "19M.1.HL.TZ0.5",
"topics": [
"topic-4-contexts"
],
"subtopics": [
"4-1-cultural"
]
},
{
"Question": "\n
Students should be provided with the pre-release document ahead of the May 2018 HL paper 3 examination, this can be found under the \"Your tests\" tab > supplemental materials > May 2018 HL paper 3 pre-release document: Accessibility.
\n
\n
Improving the accessibility to the curriculum for children with special educational needs and disabilities (SEND)
\n
\n
Source 1: Tayton School
\n
Tayton School is a primary school that teaches 500 children aged between 5 and 12. There are three classes in each year group, with a maximum of 24 students in each class. The school’s motto is “Education for Everyone”, and inclusion is at the heart of the school’s mission.
\n
The school’s Inclusion Department consists of five full-time staff, led by Sandra, and 10 learning support assistants who are active in working with the children. Sandra has recently produced a report on the students with special educational needs and disabilities (SEND) in the school, in which she found that the increasing numbers of students, and the types of SEND, means that the schools needs to invest in expanding the amount of support for the students (see Table 1).
\n
Table 1: SEND at Tayton School
\n

\n
Sandra’s report argues that, next year, the work of the Inclusion Department would be more effective if the school purchased educational digital technologies, such as social robots and assistive technologies.
\n
\n
Source 2: Social robots in education
\n
Sandra researched social robots and came back to the department meeting with this information:
\n
In 2020, a report on the use of social robots in education was published by a prestigious university professor, who concluded that social robots have the potential to be a key player in education in the way textbooks and whiteboards have been in the past. A social robot has the potential to support students in ways that could never have been envisaged 20 years ago. However, there are significant technical limitations, particularly linked to the social robot’s ability to interact with students, that will restrict their usability for the next few years
\n
\n
Source 3: Mary sees the positives
\n
Mary, one of the learning assistants at Tayton School, says:
\n
“As a parent of two school-age children, I think the potential introduction of social robots has both advantages and disadvantages. My children thought the idea of having a robot that sits with them very exciting, and I think they would do what the robot asks without questioning it. The robot will also be much more patient while they are learning their times tables!” (See Figure 1).
\n
Figure 1: Students interacting with a social robot
\n

\n
[Source: pexels.com]
\n
\n
Source 4: James has doubts
\n
James, another learning assistant at Tayton School, is wary of the overuse of digital technology in schools for children with special needs based on his experiences in other schools. He has found some research that supports his ideas.
\n

\n
[Source: pexels.com]
\n
\n
Identify two characteristics of a social robot that will make it accepted by students.
\n
[2]
\n
a.
\n
\n
Tayton School has 30 students with attention deficit hyperactivity disorder (ADHD).
\n
Describe one assistive technology solution that could be used by these students.
\n
[2]
\n
b.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Robots can be between 25 and 50 cm in size and work with students at eye level.
\n- Robots can have facial expressions that students can respond to.
\n- Robots can be personalized, such as using the student’s name or remembering things about them in their interactions.
\n
\n
Award [1] for each characteristic of a social robot identified up to [2] max.
\n
a.
\n
\n
Answers may include:
\n
\n- Apps to help organize tasks.
\n- Mind mapping apps allow children to organize their thoughts and ideas, which can be reviewed.
\n
\n
\n
\n- Apps to act as reminders and timers.
\n- Apps to set reminders can help children stay on task.
\n
\n
\n
\n- Apps to stop you being distracted.
\n- Apps to block out any distractions, such as quieting notifications, blocking other apps.
\n
\n
\n
Award [1] for identifying an example of an assistive technology solution and [1] for the description of that assistive technology up to [2] max.
\n
b.
\n
",
"Examiners report": "",
"question_id": "18M.3.HL.TZ0.1",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-7-robots-and-autonomous-technologies"
]
},
{
"Question": "\n
Should we completely automate journalism?
\n
Some of the news articles that you read are written by automated journalism software. This software uses algorithms and natural language generators to turn facts and trends into news stories.
\n
Narrative Science, a company that produces automated journalism software, predicts that by 2026 up to 90 % of news articles could be generated by machine learning algorithms.
\n
Discuss whether it is acceptable for news articles to be generated by automated journalism software.
\n
",
"Markscheme": "\n
Answers may include:
\n
Reasons why automated journalism software is acceptable (claim):
\n
\n- \nAutomation leads to articles being generated faster – this is important for breaking news (systems).
\n- It allows papers to reach a lot of niche audiences therefore increasing its reach.
\n- It can give reporters more time to do in-depth analysis of the articles they write.
\n- It can free up reporters for stories that require human thought / can eliminate some of the more mundane/boring jobs and allow reporters to focus on more thought-provoking stories.
\n- It cannot deal with subjective material, so reporters’ jobs are not at risk (values).
\n
\n
Reasons why automated journalism software is not acceptable (counter-claim):
\n
\n- It takes time and money to train the machine learning algorithms (systems).
\n- Robotic journalism can provide statistics but not analysis.
\n- Robotic journalism can’t provide the human perspective that makes articles interesting / may have inherent biases (values).
\n- Robotic journalism can create and promulgate “fake news”, as they will not know whether a story is true or not.
\n- Robotic journalism can’t discover news stories; they are restricted to information available online / the accuracy of the underlying data still matters.
\n- Robotic journalism is designed by humans who make mistakes, so robots can make mistakes too. Who is accountable for these mistakes? What regulations are in force? Where does power lie?
\n- Some newspapers do not disclose what they are doing (lack of transparency).
\n- Data will have to be constantly checked to make sure it is up to date.
\n- Journalists, especially inexperienced ones who are still learning. will lose jobs as a result of the automation of the process.
\n
\n
Note to examiners – accept terms such as automated journalism, algorithmic journalism or robotic journalism.
\n
In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: economic, regulations, codes, policies, transparency, accountability, bias, perspective, automation, machine learning, algorithm, change, power, systems, values
\n
\n
Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "19M.1.HL.TZ0.6",
"topics": [
"topic-2-concepts"
],
"subtopics": [
"2-1-change"
]
},
{
"Question": "\n
Students should be provided with the pre-release document ahead of the May 2018 HL paper 3 examination, this can be found under the \"Your tests\" tab > supplemental materials > May 2018 HL paper 3 pre-release document: Accessibility.
\n
\n
Improving the accessibility to the curriculum for children with special educational needs and disabilities (SEND)
\n
\n
Source 1: Tayton School
\n
Tayton School is a primary school that teaches 500 children aged between 5 and 12. There are three classes in each year group, with a maximum of 24 students in each class. The school’s motto is “Education for Everyone”, and inclusion is at the heart of the school’s mission.
\n
The school’s Inclusion Department consists of five full-time staff, led by Sandra, and 10 learning support assistants who are active in working with the children. Sandra has recently produced a report on the students with special educational needs and disabilities (SEND) in the school, in which she found that the increasing numbers of students, and the types of SEND, means that the schools needs to invest in expanding the amount of support for the students (see Table 1).
\n
Table 1: SEND at Tayton School
\n

\n
Sandra’s report argues that, next year, the work of the Inclusion Department would be more effective if the school purchased educational digital technologies, such as social robots and assistive technologies.
\n
\n
Source 2: Social robots in education
\n
Sandra researched social robots and came back to the department meeting with this information:
\n
In 2020, a report on the use of social robots in education was published by a prestigious university professor, who concluded that social robots have the potential to be a key player in education in the way textbooks and whiteboards have been in the past. A social robot has the potential to support students in ways that could never have been envisaged 20 years ago. However, there are significant technical limitations, particularly linked to the social robot’s ability to interact with students, that will restrict their usability for the next few years
\n
\n
Source 3: Mary sees the positives
\n
Mary, one of the learning assistants at Tayton School, says:
\n
“As a parent of two school-age children, I think the potential introduction of social robots has both advantages and disadvantages. My children thought the idea of having a robot that sits with them very exciting, and I think they would do what the robot asks without questioning it. The robot will also be much more patient while they are learning their times tables!” (See Figure 1).
\n
Figure 1: Students interacting with a social robot
\n

\n
[Source: pexels.com]
\n
\n
Source 4: James has doubts
\n
James, another learning assistant at Tayton School, is wary of the overuse of digital technology in schools for children with special needs based on his experiences in other schools. He has found some research that supports his ideas.
\n

\n
[Source: pexels.com]
\n
\n
An assistive technology app and a social robot can help a student with the same lesson.
\n
Explain one interactive feature of a social robot that will help a student with the same lesson that an app would not be able to do.
\n
[3]
\n
a.
\n
\n
Explain one action that needs to be taken by the school so that the students can benefit from any assisted technology that is purchased.
\n
[3]
\n
b.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Activities that involve movement…
\n- the robot can move with the child…
\n- whereas an app would show the robot moving on the screen only.
\n
\n
\n
\n- Input devices to interact with the child…
\n- the robot can have a wide range of sensors to interact with the child…
\n- whereas an app will depend on the mobile device, e.g., touch screen and microphone.
\n
\n
\n
\n- Output devices to interact with the child…
\n- a robot can respond in different ways when the child is interacting, e.g., 3D facial expressions, movement…
\n- whereas an app can only output visuals that are 2D on the screen.
\n
\n
\n
Award [1] for the social robot feature and [1] for the description of the feature, and [1] for an explanation of why it is different from the app up to [3] max.
\n
a.
\n
\n
Answers may include:
\n
\n- Research the needs of the children that the assisted technology is being purchased for…
\n- assisted technologies are wide and varied and not general…
\n- so specific learning needs need to be identified before suitable assisted technology can be purchased for use by the individuals to help with their learning.
\n
\n
\n
\n- Installation or setting up of the assisted technology…
\n- assisted technology may need to be set up or configured to each user…
\n- this is required so that the assisted technology can effectively assist the student’s access to learning in the classroom.
\n
\n
\n
\n- Provide suitable training for staff…
\n- introducing staff to working with assisted technology and setting it up for a student takes time…
\n- training ensures that assisted technology is used appropriately with the student and that the benefits the technology can provide can be maximized.
\n
\n
\n
\n- Provide time for staff to plan for the integration of the assisted technology in the lessons…
\n- different technologies will need to be planned for in each lesson; with students with a variety of needs, this can be time-consuming on a day-to-day basis…
\n- with effective planning and integration of assisted technology, students can access their learning better.
\n
\n
\n
Award [1] for the action identified, [1] for a description of the action, and [1] for an explanation of how the children benefit from the action up to [3] max.
\n
b.
\n
",
"Examiners report": "",
"question_id": "18M.3.HL.TZ0.2",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-7-robots-and-autonomous-technologies"
]
},
{
"Question": "\n
Social media and political tension
\n
National governments sometimes block websites at a time of political tension. One example was in 2011, when a government prevented its citizens’ access to Twitter, Facebook and YouTube. Images on these websites were considered inappropriate, with the potential to cause hatred, violence and political unrest in that country. The national government gave direct orders to the internet service providers (ISPs) to block access to these sites for four hours. The aim was to give enough time for site officials to remove the offending images from their websites.
\n
Despite these attempts by the government, some citizens were still able to access these images using proxy servers.
\n
Many people, such as academics, believe that this approach is not appropriate and that governments should focus on the education of their citizens so that they are able to make informed decisions about how to react to potentially offensive information on websites and social media.
\n
\n
In addition to providing access to the internet, identify two functions of an internet service provider (ISP).
\n
[2]
\n
a.i.
\n
\n
Identify two characteristics of a proxy server.
\n
[2]
\n
a.ii.
\n
\n
Identify two ways that the government could have determined the identity of the persons responsible for posting the offensive images on social media.
\n
[2]
\n
a.iii.
\n
\n
Many schools block access to social networking websites like Twitter, Facebook and YouTube. However, other schools are investigating two different options:
\n
\n- Monitoring the network to view what websites the students are viewing.
\n- Giving different ages of students different levels of access to social media sites.
\n
\n
Analyse these two options.
\n
[6]
\n
b.
\n
\n
Many citizens have raised concerns about the surveillance of their web browsing history or the censorship of selected websites by their national government.
\n
To what extent is it appropriate for national governments to use surveillance and censorship to control citizens’ access to websites?
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Provides an IP address
\n- Provides various bandwidth options
\n- Email accounts
\n- Customer service
\n- Spam filtering
\n- Domain registration
\n- Web hosting
\n- Blocking sites
\n- Firewall
\n- Parental controls
\n- VPN
\n- Set-up / installation (e.g., for new customers)
\n- Routing data / data packets
\n- Load balancing
\n- Provides DNS servers
\n- Provides anti-virus protection / software
\n- Controls the amount of data transfer / data usage allowed
\n- Provides cloud storage services.
\n
\n
Award [1] for identifying each characteristic of an internet service provider up to a maximum of [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- Acts as a gateway between the local network computer and a larger network (such as the internet)
\n- Provides increased performance and security
\n- Can be hardware or software
\n- Connecting through a proxy server can slow down the connection
\n- Changes the IP address used to access websites
\n- Allows users to access websites banned/blocked in their home country or by organizations (e.g., employers)
\n- Allows users to keep their location information private
\n- Allows users to appear to be accessing the internet from the country in which the proxy server is located
\n
\n
Award [1] for identifying each characteristic of a proxy server up to a maximum of [2].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- IP address
\n- MAC address
\n- Unique serial number
\n- Personal identifying data stored on the device and included with the photo (e.g., in the photo’s EXIF metadata)
\n- GPS location data stored with the photo
\n
\n
Information from the social media provider
\n
\n- Login credentials to the social media account (e.g., username).
\n
\n
N.B.: Some students may take the alternative perspective that the identity of the person cannot be determined, only the device, for the same reasons as above.
\n
Award [1] for identifying each way that a government can determine the identity of the person responsible for posting the offending images on the social media up to a maximum of [2].
\n
a.iii.
\n
\n
Answers may include:
\n
Monitoring the network:
\n
\n- It prevents cyberbullying – keep students safe (values).
\n- It teaches students responsibility – digital citizenship (values).
\n- It protects students from sharing inappropriate information and images about themselves (values).
\n- It identifies any objectionable/inappropriate content that students can access on these sites.
\n- It gathers data/information for future policies for the use (or not) of social media.
\n- Students of all ages would have access to the same websites, regardless of age – younger students could have access to objectionable/inappropriate content for their age.
\n- \nPrivacy of students – school would have access to see what the students are viewing.
\n
\n
Giving different ages different levels of access:
\n
\n- Some websites have age restrictions – should only be accessed if age appropriate (values).
\n- Younger students should not be exposed to objectionable/inappropriate content that is acceptable for older students.
\n- Schools have a responsibility to ensure the use of the network is appropriate to various ages.
\n- Younger students may not be able to differentiate between true intentions of online friendships (expression).
\n- Older students need to learn responsible digital citizenship and take responsibility for their actions (values, trust).
\n- Awareness of the benefits and drawbacks of social media sites is gained as the student matures (values).
\n- Blocking sites by age could cause issues – blocking content that is needed by older students granting different levels of access may be more cost-effective than implementing an ongoing monitoring system (power, values).
\n
\n
Keywords: home, online, social, relationships, responsibility, trust, software applications, apps, objectionable content, change, expression, identity, power, values, ethics
\n
b.
\n
\n
Answers may include:
\n
Reasons that surveillance and censorship to control citizens’ access to websites is acceptable:
\n
\n- It can keep children from being victims of cyberbullying, sex trafficking and pornography, objectionable/inappropriate content.
\n- It can control/monitor various illegal activities (values).
\n- It helps strengthen national security with laws against hacking and impose large fines and punishments (values).
\n- It can lessen the incidence of identity theft.
\n- Governments may be best informed to determine what may, or may not, be appropriate for their citizens (values).
\n
\n
Reasons that surveillance and censorship to control citizens’ access to websites is not acceptable:
\n
\n- It removes citizens’ freedom of expression.
\n- It can be used to keep information from citizens that may infringe on their privacy and/or anonymity (trust).
\n- It can be expensive for the government or may require too many resources for the benefits it brings (systems).
\n- It may accidentally block sites that should not be blocked (systems).
\n- Knowledge is power.
\n- It can be used to identify people who oppose the government (values, expression).
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: Automation, connectivity, change, power, systems, values, ethics, machine learning, accountability, transparency, autonomy, surveillance
\n
\n
Refer to SL/ HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "17N.1.SL.TZ0.2",
"topics": [
"topic-3-content",
"topic-2-concepts"
],
"subtopics": [
"3-4-networks-and-the-internet",
"2-1-change"
]
},
{
"Question": "\n
Voice biometrics technology in banking
\n
CBR Bank is introducing voice biometrics technology that will authenticate customers when they telephone the bank. It will replace the current system, in which customers have to use passwords and/or security questions.
\n
As part of the registration process, the customer has to say the phrase, “My voice is my password” three times. This provides a voice print that will be used to verify the customer’s identity in future telephone calls to the bank.
\n
\n
In addition to their voice, identify two ways how a customer can be recognized by CBR Bank’s biometrics technology.
\n
[2]
\n
a.i.
\n
\n
Identify the steps used by the voice biometrics technology to authenticate a customer calling CBR Bank.
\n
[4]
\n
a.ii.
\n
\n
CBR Bank holds a large amount of information on its customers. Some customers are concerned about the security, privacy and anonymity of their data.
\n
For each of the concerns above, explain one policy that CBR Bank could use to address the concerns of its customers.
\n
[6]
\n
b.
\n
\n
The chief executive officer (CEO) of CBR Bank, Alice McEwan, said in a recent interview, “CBR Bank will be replacing all passwords, PINs and personal verification questions for our online banking and mobile banking with voice biometrics recognition.”
\n
To what extent are the changes proposed by Alice beneficial for both CBR Bank’s customers and CBR Bank’s IT support?
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Iris/retina
\n- Facial/face
\n- Fingerprint
\n- Hand / palm print
\n
\n
Do not accept “eye recognition” – this is too vague. Iris or retina is required for marks.
\n
Award [1] for identifying each form of biometric identification up to a maximum of [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- Biometric voice feature is initially recorded.
\n- Voice is converted from analogue to digital.
\n- Voice is stored in database together with other personal information.
\n- Voice is re-scanned when person needs to be authenticated over the phone.
\n- Voice is matched with information in database.
\n- If a match, then it is authenticated.
\n- If no match, then the customer is asked to repeat the phrase and is rejected after a certain number of attempts.
\n
\n
Award [1] for identifying each of the steps used to authenticate a customer calling CBR Bank up to a maximum of [4].
\n
a.ii.
\n
\n
Answers may include:
\n
Security:
\n
\n- User access to data is limited to authorized personnel – to ensure data is secure during storage.
\n- Username and password access is implemented – to ensure data is secure during storage.
\n- A password policy is implemented (e.g., minimum length, mix of characters, changed after a given number of days etc.).
\n- Two-factor / two-step authentication is implemented (e.g., one-time password/PIN to a mobile phone, code-generating device supplied by the bank, confirmation email).
\n- Data is encrypted – to ensure data is secure during transmission.
\n- A firewall is used to protect the bank’s server.
\n- Bank servers are kept updated with the latest software / security patches.
\n- Bank employees are prohibited from accessing customer data on personal devices / devices outside the company network – to ensure that all devices are protected by the bank’s security measures.
\n
\n
Privacy:
\n
\n- Customers are informed to specify how the data may be used – if/how it may be shared with third parties.
\n- Only authorized personnel will have access to the bank database – not all employees will be able to view data.
\n
\n
Anonymity:
\n
\n- Ensure the customer’s anonymity is maintained – when data is shared with third parties, the data that could give the identity of a customer must be detached.
\n- Reports are kept anonymous – reports cannot allow individuals to be identified.
\n
\n
\n
N.B.: The response requires an explanation of a policy and not a discussion of the problems themselves. There must be a policy for each kind of concern: security, privacy and anonymity and reason(s).
\n
Award [1] for identifying a policy that CBR Bank could use to address the security, privacy and anonymity concerns of its customers and [1] for a development of the policy identified up to a maximum of [2].
\n
Mark as [2] + [2] + [2].
\n
b.
\n
\n
Answers may include:
\n
For customers:
\n
Advantages of replacing passwords with biometric voice recognition:
\n
\n- Customers don’t have to remember a password or PIN code / may not need additional verification such as one-time codes (automation).
\n- It is more secure, as voice characteristics are unique.
\n- It is harder for others to hack online banking with voice biometrics recognition (security).
\n- Some customers may have physical conditions that make entering PINs/passwords difficult – voice recognition will avoid having to type (access/inclusion).
\n
\n
Disadvantages of replacing passwords with biometric voice recognition:
\n
\n- The voice recognition system may not accept foreign accents or a range of voices (systems).
\n- Illness (such as a cold) can change a person’s voice, making identification difficult (systems).
\n- A person’s voice can be easily recorded and used for unauthorized access (security).
\n- Someone with very similar voices (e.g., a member of the same family) may be able to gain access to the bank account (security).
\n
\n
\n
For IT support:
\n
Advantages of replacing passwords with biometric voice recognition:
\n
\n- It is more secure, less likely to be hacked – fewer problems for IT staff to deal with (automation, systems).
\n- It is easy for customers to record by themselves – no IT staff required to set up (automation, systems).
\n- IT staff do not have to deal with lost password/PIN (automation, systems).
\n
\n
Disadvantages of replacing passwords with biometric voice recognition:
\n
\n- The voice recognition system may not accept particular accents – customers cannot access their online banking and will need support (systems).
\n- A person’s voice can be easily recorded and used for unauthorized access – customers may complain about unauthorized access, IT staff will have to investigate hacked accounts (security, values).
\n- Illness (such as a cold) can change a person’s voice, making identification difficult – a greater number of customers might need to call support to access their own account (systems).
\n- When the new system is implemented, CBR Bank’s IT support could be overwhelmed with overlooked bugs (reliability).
\n- Audio files / biometric templates will require more storage space than passwords / PINs – this may make backing up data more time consuming / require IT support to increase available storage space, etc (data).
\n- Initial implementation of the new system may require additional IT support staff.
\n- IT support staff may face an increased workload (e.g., if the old system initially has to run parallel to the new system).
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: security, authentication, stakeholder, reliability, data, security, change, identity, power, systems, values, ethics, accountability, transparency, access, inclusion
\n
Refer to SL/ HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "17N.1.SL.TZ0.1",
"topics": [
"topic-3-content",
"topic-2-concepts"
],
"subtopics": [
"3-4-networks-and-the-internet",
"3-1-data",
"2-1-change"
]
},
{
"Question": "\n
Hurricane warning systems
\n
In 2017, Hurricane Irma was a catastrophic disaster. Unfortunately, the computer models and simulations did not accurately predict its track (course) in time to warn residents in the areas affected. Accurately predicting the track of a hurricane is critical for protecting life and property.
\n
The potential tracks that Hurricane Irma could have taken are shown in Figure 2.
\n
Figure 2: Potential tracks of Hurricane Irma
\n

\n
The European computer model, run by the European Centre for Medium-Range Weather Forecasts, performed far better than the American model, known as the Global Forecast System. However, a new model created by the electronics company Panasonic, called PWS, performed best.
\n
The American and European models depend on data gathered from weather balloons. Panasonic, on the other hand, creates systems that collect real-time weather data from over 3500 aircraft every day.
\n
The PWS model resulted in accurate simulations of the track of the hurricane four to seven days in advance.
\n
\n
Identify two types of digital media that could be used to show the potential tracks of Hurricane Irma.
\n
[2]
\n
a.i.
\n
\n
Outline one problem that may be caused by gathering data in real time.
\n
[2]
\n
a.ii.
\n
\n
Outline why visualization is used to present data.
\n
[2]
\n
a.iii.
\n
\n
Distinguish between data and information.
\n
[2]
\n
b.i.
\n
\n
Different weather variables, such as wind speed and temperature, need to be collected in order to predict the track of a hurricane. Wind speed data is sampled more frequently than temperature data in a hurricane.
\n
Explain one reason why wind speed data would be sampled more frequently than temperature data in a hurricane.
\n
[2]
\n
b.ii.
\n
\n
Explain why the data collected about Hurricane Irma was not encrypted prior to being transmitted.
\n
[2]
\n
b.iii.
\n
\n
Companies such as Panasonic will not make the data in computer models available to governments, as they are concerned that doing so would compromise their commercial interests.
\n
Discuss whether governments should be able to make private companies such as Panasonic share their data.
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Video
\n- Images
\n- Animations
\n
\n
Award [1] for identifying each type of digital media that could be used to show the potential tracks of Hurricane Irma up to a maximum of [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- Data quality/errors in collection
\n- Will be propagated within the system, as the data is not checked for reliability/suitability.
\n
\n
Award [1] for identifying each problem, and [1] for a development of that problem up to a maximum of [2].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- Visualization presents the data in a form that is easily understandable, such as images and charts…
\n- therefore, it can be presented to audiences who may not have the specialist knowledge required to understand the information in its raw form/aids the prediction of future events.
\n
\n
\n
\n- Visualization may synthesize the data…
\n- so it can be presented in a simplified, yet understandable, manner.
\n
\n
\n
Award [1] for identifying a reason why visualization is used and [1] for a development of that reason up to a maximum of [2].
\n
a.iii.
\n
\n
Answers may include:
\n
\n- Data is facts (raw, unorganized), not contextualized.
\n- Information is processed data (interpretable) / a context has been added to the data.
\n
\n
Award [1] for a definition of either data or information and [1] for a definition of both up to a maximum of [2].
\n
b.i.
\n
\n
Answers may include:
\n
\n- The faster a variable such as wind changes…
\n- the more frequently it must be sampled.
\n
\n
\n
\n- Wind speed is the critical and rapidly changing variable in the hurricane…
\n- therefore, it needs to be sampled as regularly as possible to be able to monitor the possible trends.
\n
\n
\n
\n- Sampling the wind speed frequently…
\n- enables the track of the hurricane and its effects to be predicted more accurately.
\n
\n
\n
\n- Temperature data does not change as rapidly as wind speed…
\n- therefore, the sample rate can be lower.
\n
\n
\n
Award [1] for identifying each reason why wind speed data would be sampled more frequently than temperature data in a hurricane and [1] for a development of that reason up to a maximum of [2].
\n
b.ii.
\n
\n
Answers may include:
\n
\n- The data being collected is not sensitive in nature…
\n- therefore, there is no need to encrypt the data, as a data breach would not cause an issue.
\n
\n
\n
\n- As data encryption is not a necessary measure…
\n- the IT requirements to ensure the transmission of data are reduced, so resources can be allocated elsewhere.
\n
\n
\n
\n- Not encrypting / decrypting the data will speed up processing…
\n- in a time-critical scenario.
\n
\n
\n
\n- Not encrypting the data makes it immediately available to the wider scientific community…
\n- which allows them to improve their hurricane models.
\n
\n
\n
Award [1] for identifying a reason why the data being collected about the hurricane does not need to be encrypted and [1] for a development of that reason up to a maximum of [2].
\n
b.iii.
\n
\n
Answers may include:
\n
It is acceptable for governments to make private companies such as Panasonic share their data:
\n
\n- With its PWS, Panasonic has proved better than the American and European models at predicting the path of Hurricane Irma, so Panasonic should share its data/knowledge/algorithms, not only to help the government, but also to help people, rather than keeping vital information private and confidential (acting ethically).
\n- Hurricanes may have devastating (environmental) consequences for people and property, so in such a situation of crisis, the government should have the power and the right to access any data, even private data, that can save life (the greater good).
\n- There is no issue of individual/personal privacy or confidentiality, so this is not a case where the government would infringe on people’s rights or liberty (the greater good).
\n
\n
It is not acceptable for governments to make private companies such as Panasonic share their data:
\n
\n- \nPanasonic has invested a lot of money and other resources (such as engineers’ time) to develop its PWS model, so it is not fair towards the owners, shareholders and even workers that suddenly the government gets access (ownership) for free to all the data collected by Panasonic.\n
\n- If governments believe they should use data from aircraft and similar sources, like Panasonic, they should develop such programmes of weather predictions, rather than relying on weather balloons.
\n- As a principle, governments should respect (values) the private nature of data (and its ownership) that belongs to independent companies, otherwise this could open the gate to many other cases in scientific research (e.g., with pharmaceutical drugs) where governments overstep their boundaries and their rights.
\n- If the data from the company is incorrect and there are serious repercussions as a result, who is accountable?
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: laws, environment, knowledge, data, sharing, algorithms, ownership, accountability, change, power, systems, ethics, values
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "19M.1.SL.TZ0.2",
"topics": [
"topic-3-content",
"topic-2-concepts"
],
"subtopics": [
"3-1-data",
"2-1-change",
"3-5-media"
]
},
{
"Question": "\n
Sports watches used in physical education (PE) lessons
\n
Sports watches are now used with high school students (aged 11–18) in their physical education lessons at Collège Earlet in Quebec. Students wear the device around their wrist during sports and fitness activities. In some lessons, teachers can use their tablet to see the students’ vital signs* provided by the sports watches and even project the information for all students to see (see Figure 1).
\n
Before the lesson, teachers set heart rate targets, measured in beats per minute (bpm), for each student. During the lesson, students should aim to stay within their recommended heart rate limits. After the lesson, the software will email the students a summary of their heart rate data, as well as a number of other vital signs recorded by the sports watch, with a copy sent to their teachers and parents.
\n
Figure 1: Sports watch showing the heart rate of a student
\n

\n
\n
\n
* vital signs: signs of life used to monitor medical problems (such as heart rate)
\n
\n
Apart from heart rate, identify two vital signs that could be recorded by the sports watch.
\n
[2]
\n
a.i.
\n
\n
At the start of each lesson, the student is asked to set their maximum heart rate on the watch to 220 bpm - their age; so in the case of a 15-year-old, it would be 220 bpm − 15 = 205 bpm.
\n
Identify the steps used by the software in the sports watch to encourage students not to exceed their maximum heart rate.
\n
[4]
\n
a.ii.
\n
\n
Explain one advantage for the student of using these monitoring devices.
\n
[2]
\n
b.i.
\n
\n
Explain one advantage for the teacher if their students use these monitoring devices.
\n
[2]
\n
b.ii.
\n
\n
Explain why the reliability of the sports watches may be a concern for the teachers.
\n
[2]
\n
b.iii.
\n
\n
The principal at Collège Earlet has been discussing arrangements for sharing data from the students’ watches with a third party, Fitness World.
\n
Discuss whether the principal at Collège Earlet should agree to share data that has been collected by the students’ watches with Fitness World.
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Blood sugar / glucose levels
\n- Blood pressure
\n- Oxygen levels
\n- Body temperature
\n- Hydration levels
\n- ECG / pulse rate / heart rate
\n- Stress levels
\n- Sleep patterns
\n- Calories burned
\n- Body fat
\n- Respiratory rate/breathing rate
\n
\n
N.B.: In the context of a digital society course, it is not expected that candidates know the medical definition of a “vital sign”.
\n
Award [1] for identifying each vital sign that could be monitored by the teachers up to a maximum of [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- Device takes the measurement of the student’s heart rate.
\n- Data is converted from analog signals to digital data / analysed by the device.
\n- Heart rate value is compared with the “normal” value stored in device for student.
\n- If the value is outside the accepted range, a signal / alert is sent.
\n- If the value is inside the accepted range, no signal / alert is sent.
\n- The device waits for the next time interval to take a new measurement.
\n
\n
Award [1] for identifying each of the steps used by the sports watch to ensure that students stay within their recommended heart rate zone up to a maximum of [4].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- It can act as a personal coach for the student – motivate students to be more active, help keep students within healthy range.
\n- The recording of activity levels and frequency – can motivate students to reach healthy goals, be more active.
\n- The device can easily store information, which is emailed to the students – students can keep a copy on file to follow their progress – no need to write it down.
\n- Students can evaluate their personal fitness, such as cardiovascular system – this may lead to early notification of health issues.
\n
\n
Award [1] for identifying an advantage for the student of using these monitoring devices and [1] for a development of the policy identified up to a maximum of [2].
\n
b.i.
\n
\n
Answers may include:
\n
\n- Personalized learning – teachers can modify lessons according to students’ fitness level and needs.
\n- Determining grades – results are recorded and teachers can use this data to create grades.
\n- Motivating students – students may work harder in class if they are motivated to work harder and improve their fitness.
\n- Avoids risks associated with extreme exercise – monitoring students’ vital signs can help prevent excessive exercise or indicate health problems in advance.
\n- Teachers can monitor the students’ heart rates without stopping the activity the students are doing.
\n- Data from the watch may be more accurate than manually checking heart rates – gives the teacher more reliable data.
\n
\n
Award [1] for identifying an advantage for the teacher if their students are using these monitoring devices and [1] for a development of the policy identified up to a maximum of [2].
\n
b.ii.
\n
\n
Answers may include:
\n
\n- Recorded results may be inconsistent – this would make it difficult to determine if a student is improving or not – would also make it difficult to determine if there is a health issue.
\n- It may push students’ limits too far if data is incorrect – students may overexert themselves if the device does not indicate they are over their heart rate limit.
\n- Student progress may not be accurate – teachers may think the students are improving and grade them accordingly.
\n- Data may not be received by teacher – due to network issues.
\n- A student’s watch may malfunction – if it is not working this may delay the lesson – hardware is not reliable.
\n- Students might find a way to fool the watch into recording activities when none are taking place (e.g., swinging an arm rapidly to simulate running) – teachers would get unreliable data.
\n- Teachers are concerned that a summary of unreliable results may be sent to students’ parents and cause them to worry.
\n
\n
Award [1] for identifying a reason why the reliability of the sports watches may be a concern for the teachers and [1] for a development of the reason identified up to a maximum of [2].
\n
b.iii.
\n
\n
Answers may include:
\n
Reasons for sharing the data with Fitness World:
\n
\n- \nData sharing may lead to further analysis of student performance, leading to improved performance or other health related benefits / can benchmark student with other students from other schools.
\n- Students may see the value of being part of the programme (values).
\n- The company may provide other resources to the school if they share data.
\n- Students may be able to upload their data to the Fitness World site and communicate with students from other schools who use the same watches (systems, values).
\n
\n
Reasons for not sharing the data with Fitness World:
\n
\n- Students may be under 18, and data sharing may be inappropriate, unethical or illegal (values).
\n- The privacy of student data may be compromised.
\n- The security of data could be stolen or shared without permission.
\n- It could put pressure on students if data is being shared or compared with others (power, values).
\n- School policies may not allow student information to be shared with third party (values).
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: automation, change, power, systems, values, ethics, data, accountability, anonymity, privacy, surveillance
\n
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "17N.1.SL.TZ0.3",
"topics": [
"topic-3-content",
"topic-4-contexts",
"topic-2-concepts"
],
"subtopics": [
"3-1-data",
"3-2-algorithms",
"4-4-health",
"2-1-change"
]
},
{
"Question": "\n
Students should be provided with the pre-release document ahead of the May 2019 HL paper 3 examination, this can be found under the \"Your tests\" tab > supplemental materials > May 2019 HL paper 3 pre-release document: AV.
\n
\n
Mobility challenges for the elderly, young, disadvantaged, and handicapped.
\n
Source 1: Miketon
\n
Miketon is a small town with a population of 5000. It has one taxi company with two drivers who are about to retire. There are no plans for the taxi company to continue. The town council is aware that this will create problems for the elderly citizens who live in the community. The council predicts that this problem will grow, as there are increasing numbers of elderly people retiring to the area.
\n
Miketon is 20 km from the regional centre, Towbro, which has a population of 300 000. As a result of this closeness, it is also popular with young families, as it is within commuting* distance (see Figure 1).
\n
Figure 1: Map showing the locations of Miketon and Towbro
\n

\n
The loss of the taxi service and an infrequent bus service to Towbro will create problems for both the elderly, who need access to the hospital, and for teenagers who wish to attend cultural and sporting events in Towbro.
\n
\n
* Commuting: to travel some distance between one's home and place of work on a regular basis.
\n
\n
Source 2: Miketon Town Council
\n
Miketon Town Council wants to solve this problem and has two suggestions they will put forward at the next council meeting.
\n
\n- A fleet of autonomous vehicles is purchased by the council that could be used by anyone in the town at a subsidized rate. All bookings would be made through the council website or the council transport app. The autonomous vehicles would easily cover the distances between the regional centre and other locations.
\n- A ride-share company is invited to start operations in Miketon. To entice companies and local drivers to participate, the council would subsidize the trips by paying a surcharge (an amount added to the fare), which would be credited to the ride-share drivers and company.
\n
\n
Both suggestions have advantages as well as limitations.
\n
\n
Source 3: Readiness for autonomous vehicles
\n
Each country can be graded using criteria that determine how ready it is for autonomous vehicles. The grade can be either very ready, ready, or not ready. Four of the criteria used to determine the readiness of the country in which Miketon is located are shown in Figure 2.
\n
Figure 2: Criteria and scores for the country in which Miketon is located
\n

\n
\n
Source 4: A pilot study of a ride-sharing scheme called Rideshare
\n
The findings of the Rideshare pilot scheme (see Figure 3), show that by carefully designing the integration of ride sharing with public transport services, the ride-sharing scheme can be successful to a significant extent.
\n
Figure 3 Rideshare board
\n

\n
Three features of the Rideshare pilot scheme were:
\n
\n- It was developed and implemented with the support of the local council and citizens.
\n- Ride-sharing notice boards with information about the services were placed at local bus stops and in railway stations to promote the use of these services in an integrated way.
\n- The pricing strategy ensured that ride sharing was so expensive that it deterred people from using it and not too cheap that it stopped people using public transport.
\n
\n
\n
Identify two ways how an autonomous vehicle can verify it is collecting the right passenger.
\n
[2]
\n
a.
\n
\n
Identify two characteristics of ride-sharing apps that have made them popular
\n
[2]
\n
b.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- The passenger would be given a number code when booking and could enter the code in the system on the autonomous vehicle for verification with the booking code.
\n- When the passenger approaches the car, the code can be shared with the autonomous vehicle for verification.
\n- The customer can speak to the autonomous vehicle with details of the booking, and it would be verified with the details that the autonomous vehicle has been given for the booking.
\n- The autonomous vehicle could scan the code on the passenger’s phone and verify the code on the booking.
\n
\n
\n
Award [1] for each way how the autonomous vehicle could verify it was picking up the right passenger, up to [2] max.
\n
a.
\n
\n
Answers may include:
\n
\n- They are often cheaper than taxis.
\n- They are often quicker to arrive than taxis.
\n- They can often track their location to monitor their arrival.
\n- They are more convenient than public transport.
\n
\n
\n
Award [1] for each characteristic of a ride-sharing app identified up to [2] max.
\n
b.
\n
",
"Examiners report": "",
"question_id": "19M.3.HL.TZ0.1",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-7-robots-and-autonomous-technologies",
"3-3-computers"
]
},
{
"Question": "\n
Students should be provided with the pre-release document ahead of the May 2018 HL paper 3 examination, this can be found under the \"Your tests\" tab > supplemental materials > May 2018 HL paper 3 pre-release document: Accessibility.
\n
\n
Improving the accessibility to the curriculum for children with special educational needs and disabilities (SEND)
\n
\n
Source 1: Tayton School
\n
Tayton School is a primary school that teaches 500 children aged between 5 and 12. There are three classes in each year group, with a maximum of 24 students in each class. The school’s motto is “Education for Everyone”, and inclusion is at the heart of the school’s mission.
\n
The school’s Inclusion Department consists of five full-time staff, led by Sandra, and 10 learning support assistants who are active in working with the children. Sandra has recently produced a report on the students with special educational needs and disabilities (SEND) in the school, in which she found that the increasing numbers of students, and the types of SEND, means that the schools needs to invest in expanding the amount of support for the students (see Table 1).
\n
Table 1: SEND at Tayton School
\n

\n
Sandra’s report argues that, next year, the work of the Inclusion Department would be more effective if the school purchased educational digital technologies, such as social robots and assistive technologies.
\n
\n
Source 2: Social robots in education
\n
Sandra researched social robots and came back to the department meeting with this information:
\n
In 2020, a report on the use of social robots in education was published by a prestigious university professor, who concluded that social robots have the potential to be a key player in education in the way textbooks and whiteboards have been in the past. A social robot has the potential to support students in ways that could never have been envisaged 20 years ago. However, there are significant technical limitations, particularly linked to the social robot’s ability to interact with students, that will restrict their usability for the next few years
\n
\n
Source 3: Mary sees the positives
\n
Mary, one of the learning assistants at Tayton School, says:
\n
“As a parent of two school-age children, I think the potential introduction of social robots has both advantages and disadvantages. My children thought the idea of having a robot that sits with them very exciting, and I think they would do what the robot asks without questioning it. The robot will also be much more patient while they are learning their times tables!” (See Figure 1).
\n
Figure 1: Students interacting with a social robot
\n

\n
[Source: pexels.com]
\n
\n
Source 4: James has doubts
\n
James, another learning assistant at Tayton School, is wary of the overuse of digital technology in schools for children with special needs based on his experiences in other schools. He has found some research that supports his ideas.
\n

\n
[Source: pexels.com]
\n
\n
The students with special educational needs and disabilities (SEND) want to be included in school activities and have appropriate access to the curriculum.
\n
The two interventions influence a student’s identity in the classroom.
\n
Evaluate the impact of educational digital technologies, such as social robots and assistive technologies, on the identity of students with SEND in Tayton School.
\n
",
"Markscheme": "\n
Answers may include:
\n
Social robots and a student’s identity
\n
\n- The student will develop an identity known to the social robot only, which may be different from that of the class teacher / friends.
\n- The social robot will not be prejudiced about the student’s disability and will know the identity of the student based on their interactions with the robot.
\n- Social robots can be programmed to detect emotion and respond accordingly, e.g., if a student is showing signs of disengagement, they can switch activities.
\n- Who will own the digital data that the robot collects through the student’s learning? How does this impact a student’s identity?
\n- The robot may be programmed with biased data, which will influence how the student learns.
\n
\n
Assistive technology and a student’s identity
\n
\n- Assistive technology, such as hardware solutions (e.g., braille keyboards) that allow students to access online sites, where they can develop their own digital identities.
\n- Assistive technology allows students accessibility, which allows them to independently access learning and hobbies and develop online relationships, which help form their identity both online and offline.
\n- Assistive technology can mitigate a child with SEND difficulties and allow them to interact with others online without prejudice.
\n
\n
Both technologies and a student’s identity
\n
\n- A social robot/assistive technology (e.g., apps) may help the student with ASD develop social skills or a student with dyslexia develop communication skills, which helps them interact with others both verbally and in written form.
\n- A social robot/assistive technology may help the student develop skills that allow them to be socially accepted in the community.
\n- Successful learning with a social robot/assistive technology will influence the student’s identity and how they interact with other students or teachers in the class.
\n- A student’s identity may be threatened because the social robot/assistive technology will determine the learning style of the student.
\n- The social robot may be programmed / the apps have activities for emotional development, which influences who the student becomes.
\n
\n
\n
Note to examiners: When discussing the concept of identity, a balance of arguments related to how the technologies will impact the student need to be discussed.
\n
Keywords: identity, ethics, values, data, app, social robot, assistive technologies, hardware, relationships, accessibility, mitigation, access, inclusion.
\n
\n
Please refer to the HL paper 3 question 3 markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "18M.3.HL.TZ0.3",
"topics": [
"topic-5-hl-extension"
],
"subtopics": [
"5-1-global-well-being"
]
},
{
"Question": "\n
Digital currency
\n
Bitcoin is a type of digital currency (cryptocurrency). This is money that can be sent via the internet and exchanged for goods, services, or money in different currencies. Users can buy bitcoins using real money, and bitcoins can either be spent or stored in a digital wallet for later use. Bitcoins can be used in every country, and sending bitcoins is as simple as sending an email.
\n
A bitcoin wallet is an application that can be installed on a computer or mobile device. Once a bitcoin wallet is installed, the user will get a bitcoin address to use when transferring bitcoins to and from the wallet. This transfer uses private and public key encryption. Users should have a strong password to access their bitcoin wallet.
\n
Bitcoin operates on a peer-to-peer (P2P) network, and users of bitcoins are identified by their bitcoin address. Some users of bitcoins wish to remain anonymous, but this is not always possible.
\n
\n
Identify two characteristics of a peer-to-peer (P2P) network.
\n
[2]
\n
a.i.
\n
\n
Identify two characteristics of a strong password.
\n
[2]
\n
a.ii.
\n
\n
The use of a password is one method of authentication.
\n
Identify two other methods of authentication.
\n
[2]
\n
a.iii.
\n
\n
Explain one reason why bitcoin makes use of encryption when transmitting data.
\n
[2]
\n
b.i.
\n
\n
Explain one reason why it may be difficult to ensure the security of information in a large peer-to-peer network such as bitcoin.
\n
[2]
\n
b.ii.
\n
\n
Some users of bitcoins are concerned that their anonymity may be compromised by their bitcoin address.
\n
Explain one way in which a bitcoin address may be used to reveal information about a bitcoin user.
\n
[2]
\n
b.iii.
\n
\n
Bitcoin transactions are made between individuals without the knowledge of banks, governments, or credit card companies. Some governments are investigating whether they should regulate digital transactions, such as those made using bitcoins.
\n
To what extent is it appropriate for governments to regulate digital transactions, such as those made using bitcoins?
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- There is no central administrator.
\n- All users of the network have the same importance.
\n- Each computer acts as both client and server.
\n- Each computer can exchange files directly with every other computer on the network.
\n
\n
Award [1] mark for identifying each characteristic of a peer-to-peer network up to a maximum of [2] marks.
\n
a.i.
\n
\n
Answers may include:
\n
\n- Sufficient length (usually more than six characters)
\n- Made up of a mixture of letters, numbers and symbols
\n- Uses upper and lower case characters
\n- Not a dictionary word/common word
\n- Not based on personal information (e.g., name, birth date, etc.) (i.e., can’t be guessed).
\n
\n
Award [1] mark for identifying each characteristic of a strong password up to a maximum of [2] marks.
\n
a.ii.
\n
\n
Answers may include:
\n
\n- Biometric authentication
\n- Fingerprint
\n- Palm print
\n- Palm vein
\n- Facial recognition
\n- Voice recognition
\n- Retinal scan
\n- PIN
\n- Passphrase
\n- Two-factor authentication
\n- Authentication token (or security token)
\n- One-time code, i.e., contact user via phone/SMS/email to provide the code
\n- Asking user to provide answers to security questions set-up when creating an account (e.g., what was the first school you attended?).
\n
\n
Award [1] mark for identifying each additional method of authentication up to a maximum of [2] marks.
\n
a.iii.
\n
\n
Answers may include:
\n
\n- To ensure there is trust in the security of the data…
\n- as users see this as an additional layer of data security.
\n \n- To prevent regulatory fines…
\n- as encryption may be seen to as an attempt to comply with regulations such as GDPR.
\n
\n
Award [1] for the reason why encryption is used when transmitting data and an additional [1] for the explanation up to a maximum of [2].
\n
b.i.
\n
\n
Answers may include:
\n
\n- The security may be carried out at the level of the individual user.
\n- This may mean that the network’s security may only be as strong as the weakest link.
\n \n
\n
\n- There is no central control that manages the security of each computer by providing virus protection/firewall…
\n- so an inexperienced user may unintentionally allow access to their whole hard drive instead of allowing access to specific folders.
\n
\n
Award [1] for the reason why the security of information may be difficult to maintain in a large peer-to-peer network such as bitcoin and an additional [1] for the explanation up to a maximum of [2].
\n
b.ii.
\n
\n
Answers may include:
\n
\n- When transmitted, a bitcoin address may include additional information, such as the IP address of the user’s device.
\n- This information may be aggregated from a number of sources and this larger data set will then provide sufficient information to link the bitcoin address to a person’s identity.
\n
\n
Award [1] for identifying how a bitcoin address may be used to reveal the name of a bitcoin user and an additional [1] for the explanation up to a maximum of [2] marks.
\n
b.iii.
\n
\n
Answers may include:
\n
\n- If transactions can be done without disclosing the name of the individuals (anonymity), it could be a way to use money obtained illegally (money laundering – values).
\n- Governments will not be able to see all commercial transactions and therefore may miss the possibility to tax commercial activities – informality, lack of transparency.
\n- Bitcoin wallet providers may have an agreement with clients not to disclose information – privacy invasion.
\n- It is also possible to send a payment without revealing your identity. This allows people to transfer funds across country borders without cost but also allows users to buy illegal products anonymously.
\n- \n Unregulated services, such as bitcoin, do not provide the protection of regulated services, such as banks.
\n- For governments to be able to forecast financial trends, they need to have all of the information available. If some information is withheld, it makes forecasting more problematic.
\n- There is an ongoing debate between the privacy of the user versus the security of the state. The questions could be reframed as what is an acceptable level of regulation/surveillance?
\n- If regulation is too strict, it will stifle innovation and may prevent worthwhile developments in digital currency.
\n- Different degrees of regulation by governments of different countries could create an uneven playing field for digital currency transactions.
\n- As bitcoin is global, regulation could also impact the rights of people outside the government’s jurisdiction.
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: laws, regulations, environment, cryptocurrency, privacy, anonymity, surveillance, change, power, systems, values
\n
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "18M.1.SL.TZ0.2",
"topics": [
"topic-3-content",
"topic-2-concepts"
],
"subtopics": [
"3-4-networks-and-the-internet",
"3-1-data",
"2-1-change"
]
},
{
"Question": "\n
Students should be provided with the pre-release document ahead of the May 2019 HL paper 3 examination, this can be found under the \"Your tests\" tab > supplemental materials > May 2019 HL paper 3 pre-release document: AV.
\n
\n
Mobility challenges for the elderly, young, disadvantaged, and handicapped.
\n
Source 1: Miketon
\n
Miketon is a small town with a population of 5000. It has one taxi company with two drivers who are about to retire. There are no plans for the taxi company to continue. The town council is aware that this will create problems for the elderly citizens who live in the community. The council predicts that this problem will grow, as there are increasing numbers of elderly people retiring to the area.
\n
Miketon is 20 km from the regional centre, Towbro, which has a population of 300 000. As a result of this closeness, it is also popular with young families, as it is within commuting* distance (see Figure 1).
\n
Figure 1: Map showing the locations of Miketon and Towbro
\n

\n
The loss of the taxi service and an infrequent bus service to Towbro will create problems for both the elderly, who need access to the hospital, and for teenagers who wish to attend cultural and sporting events in Towbro.
\n
\n
* Commuting: to travel some distance between one's home and place of work on a regular basis.
\n
\n
Source 2: Miketon Town Council
\n
Miketon Town Council wants to solve this problem and has two suggestions they will put forward at the next council meeting.
\n
\n- A fleet of autonomous vehicles is purchased by the council that could be used by anyone in the town at a subsidized rate. All bookings would be made through the council website or the council transport app. The autonomous vehicles would easily cover the distances between the regional centre and other locations.
\n- A ride-share company is invited to start operations in Miketon. To entice companies and local drivers to participate, the council would subsidize the trips by paying a surcharge (an amount added to the fare), which would be credited to the ride-share drivers and company.
\n
\n
Both suggestions have advantages as well as limitations.
\n
\n
Source 3: Readiness for autonomous vehicles
\n
Each country can be graded using criteria that determine how ready it is for autonomous vehicles. The grade can be either very ready, ready, or not ready. Four of the criteria used to determine the readiness of the country in which Miketon is located are shown in Figure 2.
\n
Figure 2: Criteria and scores for the country in which Miketon is located
\n

\n
\n
Source 4: A pilot study of a ride-sharing scheme called Rideshare
\n
The findings of the Rideshare pilot scheme (see Figure 3), show that by carefully designing the integration of ride sharing with public transport services, the ride-sharing scheme can be successful to a significant extent.
\n
Figure 3 Rideshare board
\n

\n
Three features of the Rideshare pilot scheme were:
\n
\n- It was developed and implemented with the support of the local council and citizens.
\n- Ride-sharing notice boards with information about the services were placed at local bus stops and in railway stations to promote the use of these services in an integrated way.
\n- The pricing strategy ensured that ride sharing was so expensive that it deterred people from using it and not too cheap that it stopped people using public transport.
\n
\n
\n
Explain how Miketon Town Council could encourage its citizens to use the ride-sharing app.
\n
[3]
\n
a.
\n
\n
Explain why an autonomous vehicle may not choose the best route from Miketon to Towbro, the regional centre.
\n
[3]
\n
b.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Create a pricing structure that is competitive…
\n- this could be done by subsidizing the user…
\n- to ensure the ride share is cheap enough to be used / priced appropriately.
\n
\n
\n
\n- Provide the council with autonomous vehicles that can be used by ride-share drivers…
\n- this could be done by creating a pool of autonomous vehicles…
\n- that could be hired / rented on demand.
\n
\n
\n
\n- Promote the availability of the new interventions…
\n- by the use of price subsidies / introductory offers…
\n- so the use of autonomous vehicles gains traction in Miketon.
\n
\n
\n
Award [1] for identifying the action taken by the council, [1] if the action is described in the context of the village and ride-share app and [1] if its action explains how it would encourage the use of the ride-share app up to [3] max.
\n
a.
\n
\n
Answers may include:
\n
Basic process by the autonomous vehicle guidance system:
\n
\n- The autonomous vehicle guidance system will use digital maps to determine a choice of routes…
\n- routes will be selected based on shortest distance and traffic…
\n- details of traffic may not be accurate in rural areas compared to the more populated areas.
\n
\n
\n
\n- The autonomous vehicle guidance system will use digital maps to determine a choice of routes…
\n- routes will be selected based on shortest distance and traffic…
\n- country lanes may be slower than the published speed, e.g., tractors driving between farms, lots of bends and narrow roads make overtaking harder.
\n
\n
\n
\n- The autonomous vehicle guidance system will use digital maps to determine a choice of routes…
\n- routes will be selected based on shortest distance and traffic…
\n- the shortest route may take the autonomous vehicle on unsuitable roads with poor lane markings.
\n
\n
\n
\n- The autonomous vehicle guidance system will use digital maps to determine a choice of routes…
\n- routes will be selected based on shortest distance and traffic…
\n- the autonomous vehicle guidance system may not have been updated with recent changes to the roads.
\n
\n
\n
Award [1] for identifying how and/or why the autonomous vehicle chose the route, [1] for describing how the problem occurs and [1] for explaining why it is not the best route up to a maximum of [3].
\n
No reference to the autonomous nature of the car, award maximum [2] marks.
\n
b.
\n
",
"Examiners report": "",
"question_id": "19M.3.HL.TZ0.2",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-3-computers",
"3-2-algorithms"
]
},
{
"Question": "\n
Voice simulation
\n
Lyrebird voice-cloning software was created by three university students from Montreal. This technology was originally developed to change the lives of people who have lost their voice. These people can use the software to create a new voice by choosing one from samples provided in the software.
\n
However, Lyrebird can also clone voices. Lyrebird claims that it can clone a person’s voice in just 60 seconds. Users only need to access the website, create an account, and generate a voice print by repeating a number of predetermined sentences. Although the cloning is not perfect, the developers of Lyrebird believe that both the time to clone the voice and the quality of the cloning will improve in the future.
\n
The software allows the user to alter the speech and add emotion (such as, anger, elation, and surprise), increasing the ways in which it can be used.
\n
The initial voice print for the cloning process requires the most time and a lot of processing power. However, creating speech from the voice print is a simple process, generating around 1000 sentences almost instantly. The voice print is saved as a compressed audio file.
\n
Lyrebird has considered the ethical issues regarding biometrics* and acknowledges that it highlights some key societal issues. Lyrebird has taken the decision to make the software available to all in an attempt to address these issues.
\n
\n
* biometrics: a means of personal identification through analysis of unique physical traits or behavioural characteristics (for example, through voice patterns or fingerprints)
\n
\n
Lyrebird uses a person’s voice print to determine their identity.
\n
Identify three other methods of biometric identification that could be used to determine a person’s identity.
\n
[3]
\n
a.i.
\n
\n
A person’s voice print can be compressed.
\n
Identify three problems that may result from compressing the voice print.
\n
[3]
\n
a.ii.
\n
\n
Analyse whether it would be appropriate for Lyrebird to release the biometric data of a user to a third party.
\n
[6]
\n
b.
\n
\n
To what extent do the benefits of using Lyrebird’s voice-cloning software outweigh the concerns that may arise from its use?
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Fingerprints
\n- Eye/retinal scans
\n- Palm prints/hand geometry
\n- Facial recognition
\n
\n
\n
Award [1] for each method of biometric feature identified up to [3] marks.
\n
a.i.
\n
\n
Answers may include:
\n
\n- Possible quality loss from the original file when decompressed.
\n- Potential for file corruption in the compression process.
\n- The compression may use significant processing resources while it is taking place, leading to other programs running more slowly.
\n
\n
\n
Award [1] for each problem that may result from compressing the voice print identified up to [3] marks.
\n
a.ii.
\n
\n
Answers may include:
\n
It would be appropriate:
\n
\n- to law enforcement agencies for a warrant, subpoena, or court order
\n- in response to requests by regulatory, legal or government agencies, as the information cannot be obtained by any other means
\n- by withholding this information it would be working against the ethical principles of Lyrebird
\n- if it is necessary or appropriate to do so to protect our rights, property, or safety
\n- where the user has provided Lyrebird with written consent to disclosure of your biometric data.
\n
\n
It would not be appropriate:
\n
\n- where the releasing of the data would lead to harm being caused to the person whose data is being released, for example, data that is linked to an underlying medical condition (values, ethics)
\n- where it is in direct contradiction of the policies that Lyrebird have for the sharing of data
\n- as it could be harmful to the reputation of Lyrebird
\n- as it is an invasion of privacy to release personal data without consent
\n- it is illegal under the laws of the country in which Lyrebird operates (e.g., GDPR).
\n
\n
\n
Keywords: legality, regulation, policies, privacy, anonymity, security, transparency, ownership, access, sharing, consent, data, GDPR, power, ethics, values
\n
b.
\n
\n
Answers may include:
\n
Benefits may include:
\n
\n- It could help people who have lost their voice.
\n- It could create better voice-activated interfaces (systems).
\n- Characters in video games could have individual voices or could clone a player’s voice as a playable character (expression, identity).
\n- It could provide interactive training and learning.
\n- It could be used in educational software to produce a more realistic experience (systems).
\n- Any device that requires speech could be enhanced by more natural voices (appointment reminders, personal assistant applications, audiobooks, etc.) (systems).
\n- Parents could use the software to “read” to their children (relationships).
\n
\n
Concerns may include:
\n
\n- It could be used to create fake news or weaken the public’s confidence/trust in news of all kinds.
\n- An increase in robocalls with realistic voices – scammers will be able to deceive people more easily or make fake calls to the police (values).
\n- It may lead to systems that use voice as a method of authentication becoming compromised, as scammers are able to quickly create a user’s voice print and access the system.
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: health, privacy, anonymity, security, transparency, ownership, access, authentication, sharing, expression, identity, power, values
\n
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "21M.1.SL.TZ0.3",
"topics": [
"topic-3-content",
"topic-4-contexts"
],
"subtopics": [
"3-4-networks-and-the-internet",
"3-1-data",
"4-1-cultural"
]
},
{
"Question": "\n
Electronic voting (e-voting)
\n
E-voting is a form of voting that uses a computer instead of a printed ballot paper. Voters go to a polling station and cast their vote using an electronic voting machine (EVM), such as the one shown in Figure 3.
\n
Voters must be authenticated by the system before casting their vote. The votes are then stored in an encrypted form in a relational database.
\n
The graphical user interface (GUI) of the EVM can be adjusted for different voters. For example, the font size can be increased for voters who have limited vision.
\n
Figure 3: Example of an electronic voting machine (EVM)
\n

\n
[Source: cmannphoto/iStock]
\n
E-voting is already used for local elections in the towns and cities of several countries, such as Belgium, Canada and Estonia. Countries such as Finland are now considering whether to use e-voting for the whole population in their national elections.
\n
\n
In addition to adaptable font size, identify two features of the e-voting graphical user interface (GUI) that could be customized to make it accessible for all voters.
\n
[2]
\n
a.i.
\n
\n
Identify two features of authentication.
\n
[2]
\n
a.ii.
\n
\n
Identify two features of encryption.
\n
[2]
\n
a.iii.
\n
\n
Elections using e-voting in countries such as Finland will create significant amounts of personal data. The government of Finland will have to ensure it has appropriate policies for the collection, storage and sharing of the data.
\n
Explain why it is important to have an appropriate policy for the collection, storage and sharing of the data from elections that use e-voting.
\n
[6]
\n
b.
\n
\n
Evaluate the advantages and disadvantages of e-voting.
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Colour scheme, especially contrast in colour (e.g., white text on black background or dark-blue text on pastel background)
\n- Text to speech / audio instructions
\n- Voice commands
\n- Screen magnification (e.g., being able to magnify part of the screen)
\n- Language options for people who are voting and require an alternative language.
\n
\n
Award [1] for identifying each aspect of the GUI that could be customized, up to a maximum of [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- Authentication is about verifying the identity of the user: it intends to prove that you are the person you claim to be.
\n- Authentication can be done by using a range of methods, such as username/password/PIN/biometric feature.
\n- Authentication is preceded by identification: identification is about giving one’s identity, but authentication goes further – it provides more evidence to confirm this.
\n- Authentication is usually followed by authorization: once your identity is confirmed, you then have access to some actions.
\n- Information provided by the user is compared with information stored in a user database.
\n
\n
Award [1] for identifying each feature of authentication up to a maximum of [2].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- Encryption is the process of coding a message so that only authorized parties can decode it and read it.
\n- Encryption is made possible by an encryption algorithm (cipher) generating cipher text that needs to be decrypted (using a key) before it can be read.
\n- The two main types of encryption are “symmetric” (the encryption and decryption keys are the same) and “public/private key” (only the receiver has the decryption key).
\n
\n
Award [1] for identifying each feature of encryption up to a maximum of [2].
\n
a.iii.
\n
\n
Answers may include:
\n
Collection of data
\n
\n- Policy – data must be collected anonymously.
\n- Explanation – so that nobody should be able to find out what someone voted.
\n
\n
\n
\n- Policy – the voter’s ID must be accurately recorded.
\n- Explanation – so nobody can vote more than once.
\n
\n
Award [1] for identifying an appropriate policy for the collection of the data and [1] for an explanation for why it is appropriate up to a maximum of [2].
\n
\n
Storage of data
\n
\n- Policy – data must be stored for x number of years.
\n- Explanation – in case of a need one day to check the data or do research on it.
\n
\n
\n
\n- Policy – data must be stored securely (i.e., encrypted, database server in a secure location, etc.).
\n- Explanation – the data could be accessed illegally and altered.
\n
\n
\n
\n- Policy – data must be backed up.
\n- Explanation – loss of data during the election would have serious consequences for the electoral process.
\n
\n
Award [1] for identifying an appropriate policy for the storage of the data and [1] for an explanation for why it is appropriate up to a maximum of [2].
\n
\n
Sharing of data
\n
\n- Policy – the data should not be shared with the private sector, and only to organizations in the public sector, for the purpose of research.
\n- Explanation – so that there is no commercial value to the data, which may be perceived as being an unethical use of data.
\n
\n
\n
\n- Policy – shared data must not be linked to a voter’s ID.
\n- Explanation – this could violate the voter’s privacy.
\n
\n
Award [1] for identifying an appropriate policy for the sharing of the data and [1] for an explanation for why it is appropriate up to a maximum of [2].
\n
Mark as [2] + [2] + [2].
\n
b.
\n
\n
Answers may include:
\n
Advantages of e-voting
\n
\n- Some voters may like to interact with such technology, which may result in more people voting, especially younger people.
\n- Some voters may like the fact that the graphical user interface (GUI) can be adjusted for easier reading, unlike printed ballot papers.
\n- Voting may take less time than with a paper ballot.
\n- Counting votes may be faster and more reliable, as it is done electronically, without the risk of human error when counting thousands of ballot papers.
\n- The system of identification and authentication could reduce the risk of fraud, making the system more transparent.
\n- The government will be able to (automatically) analyse voting outcomes (e.g., demographics of how votes were cast).
\n
\n
Disadvantages of e-voting
\n
\n- Some voters may not trust that their vote will be anonymized and remain confidential.
\n- Some voters may not know how to use the e-voting system and need to be trained / the system is not intuitive.
\n- Some people may believe that the system is rigged and that the EVMs have been dishonestly programmed (trust).
\n- It may be costly/expensive and difficult to put in place, if all polling stations must be equipped with EVMs.
\n- If there is any electronic glitch, the system will lose credibility, and the results will be less reliable.
\n- The system may be open to hacking/not secure, or open to hacking / unethical behaviour.
\n- Should the system not perform as expected, who is accountable?
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: voting, reliability, transparency, accountability, trust, automation, intuitive, identification, authentication, security, cost, change, expression, power, systems, values
\n
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "19M.1.SL.TZ0.3",
"topics": [
"topic-3-content",
"topic-4-contexts",
"topic-2-concepts"
],
"subtopics": [
"3-3-computers",
"3-4-networks-and-the-internet",
"3-1-data",
"4-6-political",
"2-1-change"
]
},
{
"Question": "\n
Sports photographs
\n
ACP is a company that specializes in taking photographs of participants in large sporting events, such as cycling and running events. ACP recently photographed the participants in a cycle event (see Figure 2).
\n
Figure 2: An example of a low-resolution image that includes a watermark from the ACP website
\n

\n
ACP’s photographers were positioned at five different points on the course, including the start and finish lines. Each photographer is equipped with a digital camera that takes high-resolution images1. The photographer’s job is to photograph as many participants as possible.
\n
After the event, the photographs are compressed and transferred from each camera’s memory card to the ACP database. The photographs have tags added by the software, which recognizes the race participant by the number pinned to their bike.
\n
The images for each participant have their resolution reduced and are watermarked2 before they are added to ACP’s website. The participants are then able to purchase high-resolution copies of the photographs that do not have watermarks.
\n
It is also possible for anybody who views the image to purchase and download a high-resolution copy.
\n
\n
1 resolution: the detail an image holds. It can be measured in pixels per centimetre.
\n
2 watermark: a message (usually a logo, stamp, or signature) superimposed onto an image
\n
\n
Identify two types of digital media ACP could use on its website.
\n
[2]
\n
a.i.
\n
\n
Identify two file compression techniques.
\n
[2]
\n
a.ii.
\n
\n
Outline one problem that may be caused by the use of file compression techniques.
\n
[2]
\n
a.iii.
\n
\n
Explain why each image has its resolution reduced before it is uploaded to ACP’s website.
\n
[3]
\n
b.i.
\n
\n
Explain why each image is watermarked before it is uploaded to ACP’s website.
\n
[3]
\n
b.ii.
\n
\n
Some people feel uncomfortable about having their photographs taken and posted on a public website.
\n
To what extent is it acceptable for ACP to take photographs of participants, post them online, and sell them without asking their permission?
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Images
\n- Videos/screencasts
\n- Animations
\n- Text
\n
\n
\n
Award [1] for identifying each type of digital media ACP could use on its website up to maximum of [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n
\n
Award [1] for identifying each appropriate technique up to maximum of [2].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- The file may not able to be returned to its original state…
\n- which may mean it is not of an appropriate quality / is corrupted/made unusable
\n
\n
\n
Award [1] for identifying a problem of using file compression techniques and [1] for a development of that problem up to maximum of [2].
\n
a.iii.
\n
\n
Answers may include:
\n
\n- Reducing the resolution of an image reduces its size…
\n- so that it can be uploaded more quickly…
\n- which ensures that the maximum amount of data may be transferred in the shortest possible time, which in the case of a cycle event means the competitors can see images immediately after a race / reduces its size so web pages load more quickly when competitors are trying to view them.
\n
\n
\n
Award [1] for identifying a reason why each image has its resolution reduced and [1] for each subsequent development of that problem up to maximum of [3].
\n
b.i.
\n
\n
Answers may include:
\n
\n- Watermarking ensures that the image available on screen is not suitable for use beyond being seen as a preview.
\n- It prevents people downloading a printable copy without paying the company.
\n- The identity of the photographer is easily visible to the prospective purchaser of the image, so the participant can easily select between different photographers / creates an identity of the company that owns the photograph.
\n
\n
\n
Award [1] for identifying a reason why each image is watermarked and [1] for each subsequent development of that problem up to maximum of [3].
\n
b.ii.
\n
\n
Answers may include:
\n
Arguments for it being acceptable:
\n
\n- It is acceptable if participants (or their parents) signed an agreement / consent / transparency for the photo to be taken when they entered the race.
\n- It is acceptable if the images (content) are not offensive or infringe the privacy of the riders (i.e., it is not possible to aggregate information from a number of sources to determine the identity of the rider).
\n- \nACP provides the riders with a number of professional photographs (digital media) of them that they may want to use on their own websites or for social networking sites.
\n- As the photographers are reputable and have been sanctioned by the race organizers, there is no problem.
\n- The photos may be circulated by riders anyway, so the issues related to privacy may be unfounded.
\n
\n
Arguments for it not being acceptable:
\n
\n- If ACP has not sought the agreement / consent of the riders, there could be issues linked to the privacy of the riders being compromised. Parental permission would be needed if minors (under 18 years) are involved.
\n- Some riders may not want / consent to their photos published on public websites – there may be reasons they do not wish to publicize that they were in the race (e.g., off work due to supposed illness).
\n- Riders may feel that publicly shared photos don’t show them in their best moments.
\n- Riders do not get to choose which photos are available publicly (power).
\n- Some riders may have sponsorship deals that include clauses about how images of them are used (values).
\n- Some photos may be inappropriate – photographers need to abide by a code of ethics to ensure photos are appropriate.
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: data, privacy, anonymity, images, security, authenticity, consent, online forums, sub-culture, online marketplaces, change, power, values, ethics
\n
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "18N.1.SL.TZ0.3",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-5-media",
"3-4-networks-and-the-internet",
"3-1-data"
]
},
{
"Question": "\n
RESOURCE BOOKLET: Implanted microchips
\n
Source A: Graphic
\n

\n
Source B: Series of message posts
Posts from award-winning tech influencer and blogger @richtech
\n

\n
Source C: Article – Bans on microchipping employees
\n
Many countries are passing laws that prohibit companies from requiring employees to have a device such as microchip or radio frequency identification device (RFID) tag implanted into their bodies as a condition of employment.
\n
Employees can still be microchipped if they volunteer to do so. Tech4All, a technology company, has microchipped more than 50 of its employees. The company claims the microchips help people to open building doors, access their computers, and pay for items in the company restaurant.
\n
It takes 40–60 days for the chip to settle under the skin. During this period, it can itch, and scratching is discouraged as it could dislodge the chip. The chips are relatively durable and will handle most bumps, but extreme pressure has been known to shatter them. The chips do not heat up or explode when anywhere near airport security scanners, but they may fail after a magnetic resonance imaging (MRI) scan.
\n
Source D
\n
Biohacking is the next stage in human evolution. Biohackers can optimize their bodies with a combination of gadgets, microchip implants, diets, or anything else they can put into their body to make it work better. The use of microchip implants is also an extension of the concept of the Internet of Things (IoT). By 2030, it is estimated that there will be more than 75 billion connected devices.
\n
Microchips have been used in pets as form of identification to quickly reunite owners with lost or injured pets. Now, microchipping is being considered for the tracking of individuals like the elderly, those with memory loss, and prisoners.
\n
Supporters of microchip implants say they are safe and can be protected from being hacked. However, there are privacy concerns about the data transmitted from or stored on the microchip. These concerns go beyond those associated with location tracking.
\n
\n
In Source A, employees are using an embedded microchip to gain access to the building.
\n
Identify two digital systems, in addition to implanted microchips, that an employee could use to gain access to a building in Source A.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Password
\n- Swipe card
\n- NFC
\n- Biometric \n
\n
\n
Award [1] for identifying each alternative digital system an employee could use to gain access to a building up to [2] marks. Do not accept implanted microchips.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "19M.2.SL.TZ0.1",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-4-networks-and-the-internet"
]
},
{
"Question": "\n
Students should be provided with the pre-release document ahead of the May 2019 HL paper 3 examination, this can be found under the \"Your tests\" tab > supplemental materials > May 2019 HL paper 3 pre-release document: AV.
\n
\n
Mobility challenges for the elderly, young, disadvantaged, and handicapped.
\n
Source 1: Miketon
\n
Miketon is a small town with a population of 5000. It has one taxi company with two drivers who are about to retire. There are no plans for the taxi company to continue. The town council is aware that this will create problems for the elderly citizens who live in the community. The council predicts that this problem will grow, as there are increasing numbers of elderly people retiring to the area.
\n
Miketon is 20 km from the regional centre, Towbro, which has a population of 300 000. As a result of this closeness, it is also popular with young families, as it is within commuting* distance (see Figure 1).
\n
Figure 1: Map showing the locations of Miketon and Towbro
\n

\n
The loss of the taxi service and an infrequent bus service to Towbro will create problems for both the elderly, who need access to the hospital, and for teenagers who wish to attend cultural and sporting events in Towbro.
\n
\n
* Commuting: to travel some distance between one's home and place of work on a regular basis.
\n
\n
Source 2: Miketon Town Council
\n
Miketon Town Council wants to solve this problem and has two suggestions they will put forward at the next council meeting.
\n
\n- A fleet of autonomous vehicles is purchased by the council that could be used by anyone in the town at a subsidized rate. All bookings would be made through the council website or the council transport app. The autonomous vehicles would easily cover the distances between the regional centre and other locations.
\n- A ride-share company is invited to start operations in Miketon. To entice companies and local drivers to participate, the council would subsidize the trips by paying a surcharge (an amount added to the fare), which would be credited to the ride-share drivers and company.
\n
\n
Both suggestions have advantages as well as limitations.
\n
\n
Source 3: Readiness for autonomous vehicles
\n
Each country can be graded using criteria that determine how ready it is for autonomous vehicles. The grade can be either very ready, ready, or not ready. Four of the criteria used to determine the readiness of the country in which Miketon is located are shown in Figure 2.
\n
Figure 2: Criteria and scores for the country in which Miketon is located
\n

\n
\n
Source 4: A pilot study of a ride-sharing scheme called Rideshare
\n
The findings of the Rideshare pilot scheme (see Figure 3), show that by carefully designing the integration of ride sharing with public transport services, the ride-sharing scheme can be successful to a significant extent.
\n
Figure 3 Rideshare board
\n

\n
Three features of the Rideshare pilot scheme were:
\n
\n- It was developed and implemented with the support of the local council and citizens.
\n- Ride-sharing notice boards with information about the services were placed at local bus stops and in railway stations to promote the use of these services in an integrated way.
\n- The pricing strategy ensured that ride sharing was so expensive that it deterred people from using it and not too cheap that it stopped people using public transport.
\n
\n
\n
It was recently reported that an autonomous vehicle had collided with an elderly person in a wheelchair that had rolled into the road. The autonomous vehicle chose to run over the wheelchair rather than avoid it, as swerving would have put two children at risk. This incident led to a discussion in the council about the ethical decision-making process used by the autonomous vehicle.
\n
Discuss who should be accountable for an accident in the town involving an autonomous vehicle.
\n
",
"Markscheme": "\n
Answers may include:
\n
Possible stakeholders include: car manufacturers, the council that purchased the vehicles and controls its use, the elderly person, and the two children and their parents.
\n
For the car manufacturer to be accountable:
\n
\n- They designed the decision-making process (values).
\n- The car should be able to operate safely under all conditions (systems).
\n- The manufacturer should have provided information to the council and the optimum operating circumstances for the autonomous vehicles (policies).
\n
\n
For the council to be accountable:
\n
\n- The council should have checked the limitations of the autonomous vehicles and made regulations for their use to suit them, e.g., the speed of autonomous vehicles if such an incident occurs (systems, policies).
\n- The council should have set up the road condition such that the autonomous vehicles would not encounter such a situation, by restricting the movements and speed of autonomous vehicles (systems, policies).
\n
\n
For the elderly person to be accountable:
\n
\n- They should have more control over their wheelchair / can be proved they were negligent.
\n
\n
For the children and their parents to be accountable:
\n
\n- The children should not have been close to a dangerous road.
\n- The parents should have supervised their children better.
\n
\n
\n
Note to examiners: When discussing who is accountable, a range of stakeholders need to be considered with a balance of reasons why they might be accountable as opposed to a different stakeholder. A minimum of three stakeholders would be expected for the higher markbands.
\n
Keywords: change, power, systems, ethics, values, autonomous, policies, laws, regulations, reliability.
\n
\n
Please refer to the HL paper 3 question 3 markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "19M.3.HL.TZ0.3",
"topics": [
"topic-5-hl-extension"
],
"subtopics": [
"5-3-sustainable-development"
]
},
{
"Question": "\n
Students should be provided with the pre-release document ahead of the May 2019 HL paper 3 examination, this can be found under the \"Your tests\" tab > supplemental materials > May 2019 HL paper 3 pre-release document: AV.
\n
\n
Mobility challenges for the elderly, young, disadvantaged, and handicapped.
\n
Source 1: Miketon
\n
Miketon is a small town with a population of 5000. It has one taxi company with two drivers who are about to retire. There are no plans for the taxi company to continue. The town council is aware that this will create problems for the elderly citizens who live in the community. The council predicts that this problem will grow, as there are increasing numbers of elderly people retiring to the area.
\n
Miketon is 20 km from the regional centre, Towbro, which has a population of 300 000. As a result of this closeness, it is also popular with young families, as it is within commuting* distance (see Figure 1).
\n
Figure 1: Map showing the locations of Miketon and Towbro
\n

\n
The loss of the taxi service and an infrequent bus service to Towbro will create problems for both the elderly, who need access to the hospital, and for teenagers who wish to attend cultural and sporting events in Towbro.
\n
\n
* Commuting: to travel some distance between one's home and place of work on a regular basis.
\n
\n
Source 2: Miketon Town Council
\n
Miketon Town Council wants to solve this problem and has two suggestions they will put forward at the next council meeting.
\n
\n- A fleet of autonomous vehicles is purchased by the council that could be used by anyone in the town at a subsidized rate. All bookings would be made through the council website or the council transport app. The autonomous vehicles would easily cover the distances between the regional centre and other locations.
\n- A ride-share company is invited to start operations in Miketon. To entice companies and local drivers to participate, the council would subsidize the trips by paying a surcharge (an amount added to the fare), which would be credited to the ride-share drivers and company.
\n
\n
Both suggestions have advantages as well as limitations.
\n
\n
Source 3: Readiness for autonomous vehicles
\n
Each country can be graded using criteria that determine how ready it is for autonomous vehicles. The grade can be either very ready, ready, or not ready. Four of the criteria used to determine the readiness of the country in which Miketon is located are shown in Figure 2.
\n
Figure 2: Criteria and scores for the country in which Miketon is located
\n

\n
\n
Source 4: A pilot study of a ride-sharing scheme called Rideshare
\n
The findings of the Rideshare pilot scheme (see Figure 3), show that by carefully designing the integration of ride sharing with public transport services, the ride-sharing scheme can be successful to a significant extent.
\n
Figure 3 Rideshare board
\n

\n
Three features of the Rideshare pilot scheme were:
\n
\n- It was developed and implemented with the support of the local council and citizens.
\n- Ride-sharing notice boards with information about the services were placed at local bus stops and in railway stations to promote the use of these services in an integrated way.
\n- The pricing strategy ensured that ride sharing was so expensive that it deterred people from using it and not too cheap that it stopped people using public transport.
\n
\n
\n
With reference to the stimulus material above and to your own inquiries, recommend the digital intervention(s) that the council should choose to address the challenge of ensuring mobility associated with living in towns such as Miketon.
\n
",
"Markscheme": "\n
The candidate must evaluate both interventions using the criteria in the guide and the information from the sources to support the recommendation made.
\n
Answers may include:
\n
Evaluation of the use of autonomous vehicles
\n
Equity:
\n
\n- The capabilities of autonomous vehicles address the needs of both the young, the elderly, and people with disabilities for efficient and effective transport (inclusion). However, the individual needs may not be fully and effectively satisfied, and the efficiency of autonomous vehicles might not be as desired as outlined in some of the other evaluation points.
\n
\n
Acceptability:
\n
\n- The country scores very ready in the acceptance criterion (Source 3).
\n- The citizens would need to learn about and accept being in autonomous vehicles, which have not completely proven themselves. A publicity campaign might be needed.
\n- Citizens may not wish their children to travel without adult supervision (trust, values).
\n
\n
Cost:
\n
\n- Council subsidies will make autonomous vehicles cost effective for citizens (Source 2)
\n- The initial cost of each autonomous vehicle is significant, and the ongoing maintenance costs need to be considered as well, including petrol. The costs of repairs and insurance also need to be considered, as well as the cost of a depot for the autonomous vehicles to be stored in when not being used.
\n- Setting up and maintaining the booking app/website needs to be paid for.
\n- The use of an autonomous vehicle could be paid to the council by the users based on a range of factors, such as distance, time to wait, etc.
\n- The cost of road infrastructure to suit the use of autonomous vehicles would need to be considered and could be significant.
\n
\n
Feasibility:
\n
\n- The autonomous vehicles would easily cover the distances required to the regional centre and other locations (Source 2) (systems).
\n- The country ranks fourth with laws which makes it feasible to operate autonomous vehicles on the roads (Source 3) (systems).
\n- Technically, there is widespread 5G in the country, but this may not be fully in the rural areas (Source 3) (systems).
\n- Technically, the use of autonomous vehicles is still not fully worked out yet (systems, values).
\n- Socially, the acceptance of autonomous vehicles can be an issue for some, as outlined above.
\n- Politically, the use of autonomous vehicles will need to pass the council meeting, where the other negative evaluation points will need to be addressed (policies).
\n
\n
Innovation:
\n
\n- There is a pool of IT professionals to support autonomous vehicles in the country (Source 3).
\n- The road infrastructure has been developed to accommodate autonomous vehicles, and data is collected (Source 3).
\n- The use of new digital technology that has not been fully developed to the ideal of a level 5 autonomous vehicle might be too innovative for citizens. There is the potential that the current autonomous vehicles may not be developed enough to be reliable for the task they need to do, as many of the recent versions only operate at level 2.
\n
\n
Ethics:
\n
\n- The ethical issues associated with the decision-making processes of the artificial intelligence controlling autonomous vehicles have not fully been worked out technically (systems) and legally in places that have trialled them (values).
\n
\n
\n
Evaluation of a ride-sharing scheme
\n
Equity:
\n
\n- The capabilities of a ride-sharing scheme would address the needs of the young, the elderly, and people with disabilities for efficient (time, cost [money, materials, people] and effort and effective [achieves desired results]) transport (access, inclusion).
\n- However, the detailed needs may not fully be satisfied, and the efficiency of the scheme might not be as desired as outlined in some of the other evaluation points.
\n
\n
Acceptability:
\n
\n- The citizens should not have any issues using the ride-sharing scheme, as it is similar to riding in a taxi (Source 4).
\n- Citizens have probably used ride-sharing schemes in other cities.
\n- Children are not comfortable with their parents being able to track their movements if they are using the family account (trust, confidence).
\n- Parents may not be comfortable with their children using ride-sharing schemes, as the drivers are strangers (trust, confidence).
\n
\n
Cost:
\n
\n- The cost of this intervention is mainly about subsidizing the payment of each trip to keep it manageable for citizens and to ensure that enough ride-share cars are available for use (Source 2).
\n- Pricing strategies have been carefully considered (Source 4).
\n- The payment could be made at regular intervals when billed by the ride-share company.
\n- The cars are purchased and maintained by the owners; the cost of the app is maintained by the ride-share company; the maintenance is paid for by the owner of the car.
\n
\n
Feasibility:
\n
\n- Rideshare can make use of existing noticeboards at bus stops (Source 4).
\n- Technically, the implementation of a ride-sharing scheme is relatively easy, as they are popular in larger cities. The app and the cars/drivers have worked well elsewhere (systems).
\n- Socially, the acceptance of the ride-sharing scheme should be good, as it is widely accepted in other places.
\n- Politically, the implementation of a ride-sharing scheme will need to pass the council meeting (policies); it should pass, as the major issue is money to subsidize the scheme but the council seems to be prepared to spend money on both schemes (Source 2).
\n
\n
Innovation:
\n
\n- The approach is not significantly innovative and not a major change to the use of the taxis that were available previously (change). Ride-share companies have been around for a significant amount of time and have proven to be effective and efficient.
\n
\n
Ethics:
\n
\n- The legal and ethical issues associated with ride-share drivers are being worked out in a range of places around the world and will need to be considered by the council, such as the timing and hours of work, the level of payment, the rating of drivers, and the responsibilities of drivers and passengers.
\n
\n
\n
The recommendation:
\n
\n- Using the evaluations of each intervention, the response needs to recommend one or the other, or a combination of both.
\n- The recommendation needs to explicitly balance the evaluations against each other in order to support the recommendation and satisfy the requirement that possible trade-offs and implications have been considered.
\n- The trade-offs and implications will need to consider which of the evaluation points is more important than the others.
\n
\n
\n
Keywords: change, power, systems, values, ethics, data, privacy, policies, app, trust, automation, reliability, accessibility, regulations, laws, access, inclusion, infrastructure, equity, acceptability, cost, feasibility, innovations, technological determinism.
\n
\n
Please refer to the HL paper 3 question 4 markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "19M.3.HL.TZ0.4",
"topics": [
"topic-2-concepts"
],
"subtopics": [
"2-1-change"
]
},
{
"Question": "\n
Braille keyboards
\n
According to the World Health Organization, over 250 million people worldwide are blind or visually impaired. Many of them use a writing system called Braille, which they read by touching patterns of raised dots with their fingertips.
\n
Several companies have recently developed Braille keyboards, such as the one shown in Figure 1. Braille keyboards use different combinations of the nine main keys to form characters.
\n
Figure 1: A Braille keyboard
\n

\n
Braille keyboards are usually very expensive. They can cost twenty or thirty times more than standard keyboards. They are always protected by patents and cannot be cheaply reproduced.
\n
Umair Osman, a young teacher in Pakistan, has invented a haptic interface that uses a flexible plastic overlay1 to imitate the layout of a Braille keyboard.
\n
Umair has also developed software that converts the combinations of keys pressed on the overlay to the corresponding ASCII2 character. The overlay, together with the software, enables visually impaired students to convert a standard keyboard into a Braille keyboard.
\n
Umair is considering releasing his software as open-source software and using crowdfunding3 to develop the Braille keyboard further.
\n
\n
\n
1 overlay: a flexible plastic cover that is placed over the keyboard to allow combinations of keys to be pressed by the user
\n
2 ASCII: American Standard Code for Information Interchange
\n
3 crowdfunding: funding projects from donations made by a large number of people via the internet
\n
\n
Identify two characteristics of a haptic interface.
\n
[2]
\n
a.i.
\n
\n
Identify two ways how Umair could have represented the algorithms prior to writing his software code.
\n
[2]
\n
a.ii.
\n
\n
Outline one reason why Umair used these representations of the algorithms prior to writing the software code.
\n
[2]
\n
a.iii.
\n
\n
Explain why Umair used surveys, interviews and observation to gather information from visually impaired people during the development of his system.
\n
[6]
\n
b.
\n
\n
Umair has decided on a strategy to develop his software and Braille keyboard by using crowdfunding and open-source software.
\n
Discuss the advantages and disadvantages of this strategy.
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Relies on touch
\n- Provides physical responses to the user
\n
\n
Award [1] for each definition, up to a maximum of [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- Structured English (text)
\n- Flow charts
\n- Pseudocode
\n
\n
Award [1] for identifying each representation, up to a maximum of [2].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- Each of the representations provide a simplified view of the code.
\n- This means it is easier for the developer to see the logic used and identify potential errors before it is written (and run) as code.
\n
\n
Award [1] for identifying a reason why Umair used these representations of the algorithms prior to writing the software code and [1] for a development of that reason up to a maximum of [2].
\n
a.iii.
\n
\n
Answers may include:
\n
Surveys
\n
\n- Provides quantitative data (or data that can easily be quantified).
\n- This may highlight key trends/patterns.
\n- Can be linked to visualization techniques that make the trends/patterns easy to understand/comprehend.
\n
\n
Interviews
\n
\n- Provides more detail than can be gathered from quantitative data.
\n- This may include insights that may need to be teased from the interviewee that develop on quantitative initial responses / give a wider perspective.
\n
\n
Observation
\n
\n- Provides real-time interaction of the visually impaired person with the technology.
\n- May be less demanding on the visually impaired person / less intrusive / not be affected by the use of language.
\n
\n
\n
Award [1] for identifying a reason why each method of gathering information was used and [1] for a development of that reason up to a maximum of [2].
\n
Mark as [2] + [2] + [2].
\n
b.
\n
\n
Answers may include:
\n
Advantages
\n
\n- Umair may be able to develop working relationships with other like-minded and trusted individuals who may be willing to fund his development work without him having to change his vision.
\n- The use of crowdfunding may lead to a relatively cheap product, which may help to reduce the digital divide between sighted and visually impaired people.
\n- This could lead to more visually impaired people being able to express themselves online.
\n- Crowdfunding may enable more rapid development of the software and overlay.
\n- The software will enable visually impaired people to redefine their identity.
\n
\n
Disadvantages
\n
\n- The Braille keyboard and associated software is very much Umair’s vision, and he may not want to relinquish control of it as he may have an emotional attachment to the software.
\n- There may not be the level of crowdfunding and collaboration Umair had anticipated, and the development of the products may not progress.
\n- There may not be the expertise in the wider community to drive the development of the software so it becomes usable.
\n- There may be unethical developers who will take Umair’s ideas and use them to develop their own products / may not share Umair’s altruistic vision.
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: innovation, trust, collaboration, digital divide, software applications, open source, algorithms, change, expression, identity, ethics, values
\n
Refer to SL/ HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "19M.1.SL.TZ0.1",
"topics": [
"topic-3-content",
"topic-1-introduction"
],
"subtopics": [
"3-3-computers",
"3-2-algorithms",
"3-1-data",
"1-1-what-is-digital-society"
]
},
{
"Question": "\n
Fake news
\n
We see and hear news every day and trust that the information provided is accurate. That belief may soon end.
\n
Artificial intelligence (AI) software is now being developed that can produce fake video footage of public figures using recordings of their own voices. Using as little as one minute of user-generated content (data), it can reproduce a particular person’s voice. The developer of this software demonstrated the results by using the voices of Bill Clinton, George Bush and Barack Obama in a computer-generated conversation.
\n
Once a person’s voice has been reproduced, a fake video can be created by processing hundreds of videos of the person’s face. Video footage of politicians are often used, as there is so much data available online.
\n
Law professor John Silverman commented that, as humans we tend to believe what we see, and the increased number of tools to make fake media that is unrecognizable from real media is going to prove a major challenge in the future.
\n
Discuss the claim that companies who develop software that can create fake videos of politicians should be accountable for the fake videos posted by users of their software on social media platforms.
\n
",
"Markscheme": "\n
Answers may include:
\n
Software companies should be accountable (claim)
\n
\n- Although there may be no legal requirement for the software company to monitor the videos of users of their software, there may be ethical reasons why they should, and it is not appropriate to hide behind an end-user agreement when the software has the potential to develop fake videos (ethics, values, transparency).
\n- The software company has not been seen to take all avoidable steps to prevent the fake videos being posted / the software company can be proved to be acting outside the spirit of the law or maliciously (ethics, values).
\n- The software company has allowed users to purchase the software in countries where there may be rigorous censorship laws appreciating that its use may be seen as unlawful (ethics, values).
\n
\n
Software companies should not be accountable (counter-claim)
\n
\n- If the software company has positioned itself as a responsible developer, and their policy documentation explicitly shows that they are practising what they preach (values, ethics) and have acted responsibly by minimizing the potential harm that may be caused.
\n- It is unrealistic and unenforceable, however well intentioned, for the software company to be accountable for the content of the videos.
\n- If the end-user agreement stated explicitly that the user would be accountable, would that clause be enforceable by the software company?
\n- It is hard to determine at what point the software company would be accountable, as the software itself does not have the capability to cause harm, it is the user who does so (values).
\n- At what point is a video considered fake? Is a spoof video a fake video (media authenticity)?
\n- What happened to free speech or freedom of expression (values, ethics)?
\n
\n
\n
In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: politics, political speech, lobbying, machine learning, speech recognition, image analysis, deepfakes, media authenticity, synthetic digital media, monitoring, accountability, responsibility, change, expression, power, values, ethics
\n
\n
Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "21M.1.HL.TZ0.6",
"topics": [
"topic-2-concepts"
],
"subtopics": [
"2-1-change"
]
},
{
"Question": "\n
RESOURCE BOOKLET: Implanted microchips
\n
Source A: Graphic
\n

\n
Source B: Series of message posts
Posts from award-winning tech influencer and blogger @richtech
\n

\n
Source C: Article – Bans on microchipping employees
\n
Many countries are passing laws that prohibit companies from requiring employees to have a device such as microchip or radio frequency identification device (RFID) tag implanted into their bodies as a condition of employment.
\n
Employees can still be microchipped if they volunteer to do so. Tech4All, a technology company, has microchipped more than 50 of its employees. The company claims the microchips help people to open building doors, access their computers, and pay for items in the company restaurant.
\n
It takes 40–60 days for the chip to settle under the skin. During this period, it can itch, and scratching is discouraged as it could dislodge the chip. The chips are relatively durable and will handle most bumps, but extreme pressure has been known to shatter them. The chips do not heat up or explode when anywhere near airport security scanners, but they may fail after a magnetic resonance imaging (MRI) scan.
\n
Source D
\n
Biohacking is the next stage in human evolution. Biohackers can optimize their bodies with a combination of gadgets, microchip implants, diets, or anything else they can put into their body to make it work better. The use of microchip implants is also an extension of the concept of the Internet of Things (IoT). By 2030, it is estimated that there will be more than 75 billion connected devices.
\n
Microchips have been used in pets as form of identification to quickly reunite owners with lost or injured pets. Now, microchipping is being considered for the tracking of individuals like the elderly, those with memory loss, and prisoners.
\n
Supporters of microchip implants say they are safe and can be protected from being hacked. However, there are privacy concerns about the data transmitted from or stored on the microchip. These concerns go beyond those associated with location tracking.
\n
\n
With reference to Source B, suggest one way how technology companies use influencers to promote their products.
\n
[2]
\n
a.
\n
\n
With reference to Source B, suggest one reason why technology companies work with influencers to promote their products.
\n
[2]
\n
b.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Providing the influencer with the product for free, so that the influencer agrees to post about the product on social media sites.
\n- Tech companies use social media data to find influencers who will target their market. That way, the influencer’s message is focused on their specific market.
\n
\n
Award [1] for way how technology companies use influencers to promote their products and [1] for a development of that reason up to [2] marks.
\n
a.
\n
\n
Answers may include:
\n
\n- It is more cost effective than target advertising, as the company can select the tech influencer by their follower demographic.
\n- Influencers are viewed as experts, so followers will trust endorsements and product mentions.
\n- Influencer content may be a personal narrative, which helps differentiate posts from the type of features- or sales-driven ones a brand might do for the same product on their own feed.
\n
\n
Award [1] for one reason why technology companies work with influencers to promote their products and [1] for the development of that reason up to [2] marks.
\n
b.
\n
",
"Examiners report": "",
"question_id": "19M.2.SL.TZ0.2",
"topics": [
"topic-4-contexts"
],
"subtopics": [
"4-1-cultural"
]
},
{
"Question": "\n
Your personal avatar
\n
SBE Cruise Lines is implementing new IT systems using artificial intelligence (AI) to enhance passenger experiences. Recently, the company equipped its ships with touch screens where passengers can interact with their own customizable 3D avatar. Passengers wear a bracelet on their wrist, and their 3D avatar appears on touch screens as they walk around the ship (see Figure 5).
\n
Figure 5: A passenger interacting with the avatar
\n

\n
The bracelet tracks a passenger’s location on the ship using thousands of sensors, and this data is constantly synchronized with that passenger’s data stored in the cloud. This may include their photo, room number or passport information.
\n
To improve the passenger experience, the avatar developers update the IT systems on the cruise ship every night. To ensure that the IT updates are completed, George Smith, the project manager, must communicate with a number of stakeholders.
\n
George believes that, to make the best improvements, the avatar developers should observe the passengers’ real-time interactions with the system.
\n
\n
Identify two stakeholders that George, the project manager, must consult before implementing the IT updates.
\n
[2]
\n
a.i.
\n
\n
Identify two sensors that the passenger’s bracelet may use.
\n
[2]
\n
a.ii.
\n
\n
Identify two types of machine learning used by artificial intelligence (AI) systems.
\n
[2]
\n
a.iii.
\n
\n
Explain why the avatar developers would create avatars that do not look like humans.
\n
[3]
\n
b.i.
\n
\n
Explain why George believes the avatar developers should observe the passengers’ real-time interactions with the system.
\n
[3]
\n
b.ii.
\n
\n
Matt Earle, the CEO of SBE Cruise Lines, has been investigating using artificial intelligence (AI) systems to track passengers and suggest activities they may wish to take part in when they interact with the touch screens on the ship. Some of his colleagues have concerns about taking this approach.
\n
To what extent should Matt rely on the recommendations from the AI system to suggest activities to passengers?
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Programmers
\n- Developers or avatar developers
\n- Information systems manager
\n- End users
\n
\n
\n
Award [1] for identifying each stakeholder up to [2 max].
\n
a.i.
\n
\n
Answers may include:
\n
\n
\n
Award [1] for identifying each sensor, up to a maximum of [2].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- Supervised
\n- Unsupervised
\n- Reinforcement
\n
\n
\n
Award [1] for identifying each type of machine learning, up to a maximum of [2].
\n
a.iii.
\n
\n
Answers may include:
\n
\n- The avatar developers were concerned that the avatar may fall into the uncanny valley;…
\n- this may trigger unwanted reactions from the users of the avatar…
\n- who may feel it detracts from the usefulness of the avatar / might lead to passengers not using the system.
\n
\n
\n
Award [1] for identifying a reason why the avatar developers would create the avatars so they do not look like humans and [1] for each subsequent development of that reason up to a maximum of [3].
\n
b.i.
\n
\n
Answers may include:
\n
\n- Observation allows for the developer to see exactly how the passengers would interact with the avatar.
\n- Observation gives more detail than would be gathered from other techniques, such as questionnaires or interviews.
\n- Observation does not rely on the passenger trying to remember what happened (either during an activity or after).
\n
\n
\n
Award [1] for identifying a reason why the avatar developers should observe the passengers' real-time interactions with the system and [1] for each subsequent development of that reason up to a maximum of [3].
\n
b.ii.
\n
\n
Answers may include:
\n
Reasons why Matt should rely on the recommendations from the AI system:
\n
\n- The recommendations are likely to be based on the greatest data set possible and use data analytics techniques: real-time interactions, etc. (systems).
\n- The use of data analytics techniques / AI should mean that they will be appropriate for individual cruise ship passengers – customized for each passenger based on data.
\n- Can create a unique experience for passengers – recommended activities, etc.
\n- Can provide changes to passenger experience quicker than if done without AI (systems).
\n
\n
Reasons why Matt should not rely on the recommendations from the AI system:
\n
\n- The recommendations may not be sufficiently customized to each passenger’s need if enough data is not collected (systems).
\n- The AI system may be expensive – the increased amount of customer satisfaction may not be sufficient to justify this cost.
\n- There may be particular characteristics of the passengers that the AI system may not be able to understand (systems).
\n- This may be a gimmick and an example of technological determinism (values, ethics).
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: leisure, data, trust, judgement, values, ethics, anonymity, privacy, monitoring, algorithm, change, systems, power
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "20N.1.SL.TZ0.4",
"topics": [
"topic-3-content",
"topic-4-contexts",
"topic-2-concepts"
],
"subtopics": [
"3-3-computers",
"3-1-data",
"3-6-artificial-intelligence",
"3-5-media",
"4-1-cultural",
"2-1-change"
]
},
{
"Question": "\n
Pepper
\n
Pepper is a social robot that uses natural language processing, as well as voice recognition, to understand what is being said. Pepper can also identify basic human emotions by analysing verbal and non-verbal clues (see Figure 1).
\n
Figure 1: Pepper the social robot
\n

\n
[Source: Wikipedia, 2019. Pepper (robot). [image] Available at:
https://en.wikipedia.org/wiki/Pepper_(robot). Accessed 21 March 2019.]
\n
Pepper has multiple sensors and a battery that lasts for 12 hours and is equipped with wireless connectivity. Pepper is released in batches of a thousand, and they usually sell out immediately.
\n
Software developers can create new apps for Pepper, as the robot has a generic profile. So far, Pepper has been successfully used on cruise ships, in homes in Japan, and with the elderly in the United Kingdom. However, Pepper could not answer questions from customers in supermarkets in some parts of the USA and Latin America.
\n
\n
Pepper uses machine learning to improve its natural language processing.
\n
\n
In addition to a voice sensor, identify two sensors that would be found in Pepper.
\n
[2]
\n
a.i.
\n
\n
Outline two reasons why Pepper could not answer a customer’s question in a supermarket.
\n
[4]
\n
a.ii.
\n
\n
Identify two advantages of using unsupervised learning to enable Pepper to improve its natural language processing.
\n
[2]
\n
b.i.
\n
\n
Identify two disadvantages of using unsupervised learning to enable Pepper to improve its natural language processing.
\n
[2]
\n
b.ii.
\n
\n
Pepper is released in batches of a thousand, and they usually sell out immediately.
\n
Explain one reason why Pepper is only released in relatively small batches.
\n
[2]
\n
b.iii.
\n
\n
King Robotics is planning to use social robots in schools. The robots will use a unique approach called care receiving. In this approach to teaching, the robot does not directly instruct the student; instead, the robot makes mistakes and asks the student for help to correct them. Early studies have found that children respond very positively to this approach. The robots will also be able to carry out direct teaching activities.
\n
Evaluate the advantages and disadvantages of using social robots such as Pepper to support the care-receiving teaching approach as well as carry out direct teaching activities.
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Proximity sensor (to avoid obstacles)
\n- Navigation sensor
\n
\n
\n
Award [1] for each sensor identified up to [3] marks.
\n
a.i.
\n
\n
Answers may include:
\n
\n- The developers of Pepper did not train Pepper beyond the most commonly used dialects/accents…
\n- therefore, there may be groups of people whose accent is outside Pepper’s range of words, etc.
\n \n
\n
\n- Pepper was not programmed with basic information at the store…
\n- such as the location of various items.
\n \n
\n
\n- Pepper was not tested with stakeholders, i.e., customers in the store…
\n- so designers were unable to ensure that Pepper could answer the customer’s questions.
\n
\n
\n
Award [1] for each reason why Pepper could not answer a customer’s question in a supermarket and [1] for a development of that reason up to maximum of [2] marks.
\n
a.ii.
\n
\n
Answers may include:
\n
\n- Less time-consuming than supervised learning
\n- Can occur in real time
\n
\n
\n
Award [1] for each advantage of using unsupervised learning identified up to [2] max.
\n
b.i.
\n
\n
Answers may include:
\n
\n- Dependent on the software to define the labels
\n- Less accurate than supervised learning
\n
\n
\n
Award [1] for each disadvantage of using unsupervised learning identified up to [2] max.
\n
b.ii.
\n
\n
Answers may include:
\n
\n- To accommodate feedback from customers into the next production schedule…
\n- to allow Pepper to evolve more rapidly.
\n \n
\n
\n- To accommodate software/hardware updates…
\n- to stay ahead of the competition (which would not always be possible with larger batches).
\n
\n
\n
Award [1] for identifying a reason why Pepper is released in small batches and [1] for a development of that reason up to [2] max.
\n
b.iii.
\n
\n
Answers may include:
\n
Advantages:
\n
\n- Students often respond better to robots, as they are very motivating. For example, students who are very shy often respond to robots (expression, identity).
\n- Robots that make mistakes may help with children who have special educational needs, such as those with autism (expression, identity).
\n- By teaching a robot that is less intelligent, children can reinforce their own learning. We learn by teaching others (expression, identity).
\n- The robot’s need will inspire care-taking behaviour in the children (expression, identity).
\n- Students will want to play with the robot and will feel less pressured to perform correctly (expression, identity).
\n- Robots can provide individual attention, so students can learn at their own pace (identity).
\n- Robots can co-exist with teachers in the classroom. serving as assistants.
\n- If there is a shortage of teachers, robots can fill in the gap, especially for teaching repetitive material.
\n- Robots do not have emotions, so they are not affected by health or emotional issues (reliability).
\n
\n
Disadvantages:
\n
\n- Robots can’t inspire students the way human teachers can. They can’t teach with passion and emotion (values).
\n- Robots can’t respond to children being nervous, upset, excited or loud (values).
\n- Robots can’t create opportunities for students to collaborate and work together in the classroom.
\n- Robots may lead to privacy concerns, as they can record the student’s actions and voice.
\n- Teachers have responsibilities and a duty of care, which robots cannot take over.
\n- Teachers may not trust the robots and therefore won’t allow them in the classroom.
\n- Students may not trust the robot and therefore will not participate.
\n- Cost – robots are likely to have a high cost to buy and maintain.
\n- Cost – a team will be needed to control the robot if it stops working, and fixing certain parts will be costly to the school (systems).
\n- Robots could lead to a reduction in staffing (change, automation).
\n- Robots may not understand what a student is saying (accents, volume level, etc.), and students may become frustrated (systems).
\n- Robots may malfunction, run out of power, etc. (systems).
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: innovation, learning, pedagogy, robot, social robot, autonomous, evolution, trust, automation, change, expression, identity, systems, values
\n
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "21M.1.SL.TZ0.4",
"topics": [
"topic-3-content",
"topic-2-concepts"
],
"subtopics": [
"3-3-computers",
"3-6-artificial-intelligence",
"2-1-change"
]
},
{
"Question": "\n
Biometric authorization
\n
Bright Creativa is an advertising company with approximately 100 employees, all of whom work in their head office in Seattle, USA. The company has decided to introduce a biometric authorization system using fingerprint scanners (see Figure 1). This enables the employees to gain access to the company’s resources, such as entering the building, logging on to the company network and even purchasing items from the company café.
\n
Figure 1: An employee using biometric authorization to access the office at Bright Creativa
\n

\n
[Source: adapted image (recoloured) “Fingerprint scanner in Tel Aviv” by David Shankbone (https://commons.wikimedia.org/).
Under copyright and creative commons licence 3.0 (https://creativecommons.org/licenses/by/3.0/).]
\n
The authorization system is linked to the company database. The employee’s identification number (employee ID) is the primary key field in the Employee table, which stores their personal details. The company database includes other tables that store data on when they access the building, the frequency that they log on to the network and the items they purchase from the café. Some employees are concerned about the increased level of surveillance within the company, but the company has reassured these employees that a privacy policy has been developed.
\n
\n
Identify two other forms of biometric data Bright Creativa could collect.
\n
[2]
\n
a.i.
\n
\n
Identify two characteristics of a relational database.
\n
[2]
\n
a.ii.
\n
\n
Identify two methods that could be used to ensure that the data input to the database is accurate.
\n
[2]
\n
a.iii.
\n
\n
As part of the implementation of the biometric authorization system, Bright Creativa has written a privacy policy.
\n
Explain three features that Bright Creativa would need to include in a privacy policy linked to the company’s biometric authorization system.
\n
[6]
\n
b.
\n
\n
To what extent are the benefits of employees’ improved access to company resources outweighed by their concerns about the level of surveillance by the company?
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Facial
\n- Iris / retina
\n- Voice
\n
\n
\n
Award [1] for identifying each other form of biometric data up to maximum of [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- More than one linked table/entity
\n- Primary key fields linked to foreign key fields
\n- Each record is unique
\n- Eliminates data redundancy
\n- Is a smaller file than a flat-file database
\n
\n
\n
Award [1] for identifying each characteristic of a relational database up to maximum of [2].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- Validation
\n- Verification
\n
\n
\n
Award [1] for identifying each method that can be used to ensure the data added into the database is accurate up to maximum of [2].
\n
a.iii.
\n
\n
Answers may include:
\n
\n- The privacy policy will need to be easily understood/transparent…
\n- so employees are able to understand how their data will be collected and stored or who it may be shared with.
\n \n
\n
\n- The privacy policy must explain what data is being collected about them…
\n- and this data is intended to be used by the company.
\n \n
\n
\n- The privacy policy will need to explain that data will only be stored for as long as necessary / for the length of time the employee is with the company…
\n- and that appropriate measures have been taken to safeguard it from unauthorized access.
\n \n
\n
\n- If a data breach occurs, i.e., the data is compromised or stolen…
\n- the company must inform the users immediately.
\n
\n
\n
Award [1] for identifying a feature that Bright Creativa would need to include in a privacy policy and [1] for explaining why that feature should be included up to a maximum of [2].
\n
Mark as [2] + [2] + [2].
\n
b.
\n
\n
Answers may include:
\n
Advantages to the employee:
\n
\n- Convenience, such as no need to carry ID cards to unlock doors (systems).
\n- There is no need to remember passwords to log on to the network, or to continuously change the password (systems).
\n- It is likely to be more secure than relying on authentication techniques like a username and password, as it is harder to forge a fingerprint than remember a password (systems).
\n- It may provide quicker access to resources.
\n- Employees don’t need to carry cash to buy items from the café.
\n
\n
Concerns of the employee:
\n
\n- Their performance could be monitored and performance ratings based on information provided by the system (system, values).
\n- Monitoring may become covert surveillance, which may be unethical, especially if the employees are not aware of the ways in which the information is used (values).
\n- Purchases are tracked and judgements might be made about them, e.g., what foods they purchase (values).
\n- The fingerprints may not always be reliable, for example if the employee cuts the finger that is used for biometric authentication, which means that a resource may not be accessible (values).
\n- Logging on to each resource using biometric identification may be time-consuming and lead to inefficient working practices (systems).
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: economic, security, privacy, monitoring, surveillance, access, productivity, trust, transparency, change, power, systems, values, ethics
\n
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "19N.1.SL.TZ0.1",
"topics": [
"topic-3-content",
"topic-2-concepts"
],
"subtopics": [
"3-1-data",
"2-1-change"
]
},
{
"Question": "\n
Google’s DeepMind uses a machine learning algorithm and neural network to analyse data. Google is now collaborating with the United Kingdom’s National Health Service (NHS) to develop systems that can improve the quality of health care.
\n
Its first project is to create a system that can analyse digital scans of eyes and thus help doctors diagnose sight-destroying diseases in time for them to be treated. This is a complex problem for pattern recognition.
\n
Google needs large quantities of retinal scans to test the algorithm. Moorfields Eye Hospital in London has the largest collection of retinal scans in the world and will share them with Google for free. The scans will be anonymized. Patients can opt out of sharing their data by emailing an NHS data protection officer. Google will use the knowledge gained from this project to help create future software that can eventually be marketed to health care providers.
\n
For this project, Google needs to consider the needs and concerns of multiple stakeholders, including patients, doctors, and the NHS. Google plans to hold four patient forums a year and set up a panel of independent reviewers to oversee what the company is doing. Ultimately, Google hopes to make a profit from this technology.
\n
\n
Identify two characteristics of an algorithm.
\n
[2]
\n
a.i.
\n
\n
Identify two characteristics of pattern recognition.
\n
[2]
\n
a.ii.
\n
\n
Google may use a range of representations of the algorithms during their development.
\n
Identify two ways how these algorithms may be represented.
\n
[2]
\n
a.iii.
\n
\n
Google will collect large quantities of data that will be held in data centres.
\n
Explain two concerns linked to the increasing number of data centres.
\n
[4]
\n
b.i.
\n
\n
Explain one advantage of using deep learning instead of traditional machine learning techniques.
\n
[2]
\n
b.ii.
\n
\n
It is claimed that the NHS’s partnership with Google is beneficial for both stakeholders. However, concerns have been raised about the ethical implications of this data-sharing agreement.
\n
To what extent is it ethical for the NHS to share patient information about eye scans from Moorfields Eye Hospital with Google?
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- A step-by-step procedure
\n- A set of instructions
\n- Created to perform a specific task
\n- Used by computers to perform operations/tasks
\n- Must be followed in a specific order
\n
\n
Award [1] mark for each of the characteristics identified above up to a maximum of [2] marks.
\n
a.i.
\n
\n
Answers may include:
\n
\n- Uses training data
\n- Learns from examples
\n- Once trained, the software can identify new examples of the items it has “learned”
\n- Gives an estimate of the accuracy of the identification
\n- Recognizes shapes within an image
\n- Supervised AI
\n
\n
Award [1] mark for each of the characteristics identified above up to a maximum of [2] marks.
\n
a.ii.
\n
\n
Answers may include:
\n
\n- Natural language
\n- Flow chart
\n- Pseudocode
\n- Programming code
\n
\n
Award [1] mark for each of the representations identified up to a maximum of [2] marks.
\n
a.iii.
\n
\n
Answers may include:
\n
\n- Data centres use considerable amounts of energy…
\n- which may have negative impacts on the environment.
\n \n
\n
\n- Data centres lead to the centralization of information…
\n- which may make them susceptible to security breaches.
\n
\n
Award [1] for identifying a concern linked to the use of data centres and an additional [1] for the explanation of that concern up to a maximum of [2] marks.
\n
Mark as [2] + [2].
\n
b.i.
\n
\n
Answers may include:
\n
\n- There does not need to be a domain expert involved to reduce the complexity of the data so it can be processed…
\n- which reduces the requirement for human input that machine learning requires.
\n \n- Deep learning algorithms solve the problem end-to-end…
\n- whereas machine learning solves the problem in smaller parts and aggregates the solutions (which may lead to a less accurate outcome).
\n
\n
Award [1] for identifying an advantage of using deep learning and an additional [1] for the explanation of that advantage up to a maximum of [2] marks.
\n
b.ii.
\n
\n
Answers may include:
\n
Ethical problems:
\n
\n- Can the patients decide whether to opt in or opt out (power)?
\n- \nGoogle is likely to profit from what they learn from this project.
\n- \nGoogle will benefit from improvements in its algorithm.
\n- \nGoogle will need to guarantee that the data is kept secure.
\n- \nGoogle will need to guarantee that the data is kept private.
\n- \nGoogle will need to guarantee that the data is only used for this project.
\n- Does this scheme cause harm to the patients? Is it ethical?
\n
\n
Benefits for the NHS and its patients:
\n
\n- \nGoogle could provide free access to the system to the NHS vs other health providers.
\n- The knowledge gained about preserving sight could be shared with doctors around the world, thereby benefiting many people at risk of losing their sight (values).
\n- This data may be shared/mined, and other associations may be established that may lead to preventative health care in unrelated fields.
\n- Patients may feel the benefits of sharing their data outweigh the negative implications of their data being shared (values).
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: health, medical care, medical diagnostics, data, privacy, anonymity, algorithm, change, power, systems, values
\n
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "18M.1.SL.TZ0.3",
"topics": [
"topic-3-content",
"topic-2-concepts"
],
"subtopics": [
"3-2-algorithms",
"3-6-artificial-intelligence",
"3-1-data",
"2-1-change"
]
},
{
"Question": "\n
Clouds under the sea
\n
Microsoft has located one of its data centres on the seabed. Project Natick is now operating 100 feet below the surface of the North Sea (see Figure 4).
\n
Figure 4: An artist’s representation of a data centre on the sea bed
\n

\n
[Adapted under sea photo by NOAA on Unsplash]
\n
Microsoft has chosen to develop data centres on the seabed because they claim there are concerns about the environmental impact of data centres built on land. These seabed data centres can be constructed and placed on the sea bed in 90 days. This is compared to the two years that are required for land-based data centres.
\n
Google patented their design for an underwater data centre in 2009. Even though functioning prototypes have been trialled, none have been used commercially.
\n
The demand for data storage is doubling every two years, so it is likely that an increasing number of data centres will need to be constructed. These data centres can be constructed either under the sea or on land.
\n
Discuss whether companies like Microsoft should build data centres on the seabed.
\n
",
"Markscheme": "\n
Answers may include:
\n
Reasons why Microsoft should build data centres on the seabed (claim):
\n
\n- The water surrounding the data centre can be used to cool it (space, feasibility).
\n- The percentage of the world’s water used for this purpose is almost infinitesimally small, so there is going to be almost no environmental effect (space, feasibility, acceptability).
\n- They can be hidden and will not be unsightly (space, acceptability).
\n- They won’t take up valuable sites on land that could be used for housing (space, feasibility).
\n- They are likely to need less maintenance, as once submerged they are less affected by changes in weather conditions (reliability, feasibility).
\n- The underwater data centres will take relatively less time to construct compared to those on land (cost).
\n- The increase in data storage requirements is growing rapidly/exponentially.
\n- They provide quick connections for remote coastal areas that otherwise have to use data centres that are much further away (systems, feasibility).
\n
\n
Reasons why Microsoft should not build data centres on the seabed (counter-claim):
\n
\n- The technology has existed for 10 years, but there has been no commercial development of these data centres – why is this the case (reliability, feasibility)?
\n- The data centres may need to be backed up terrestrially, so it may not be as environmentally friendly as suggested (systems).
\n- Maintenance will be more difficult, as they are less accessible (systems, feasibility).
\n- The data centres may have an impact on local ecosystems, e.g., heat from the plants / chemicals leaching from the equipment (cost, acceptability, values).
\n- The cables to the data centres may be damaged by ships (systems).
\n- Seabed data centres may be significantly more expensive than land-based ones (cost, acceptability).
\n- Finding efficient ways of delivering backup power suppliers to an underwater site may be problematic (cost, feasibility).
\n
\n
In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: environment, pollution, e-waste, reliability, connectivity, storage, maintenance, cloud, change, systems, values, cost, feasibility, acceptability
\n
Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "20N.1.HL.TZ0.5",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-1-data"
]
},
{
"Question": "\n
Accessing online media
\n
Rajesh frequently travels for his job and has found that he is unable to watch his favourite films and television (TV) channels when abroad (see Figure 1). He has been informed that he can subscribe to an internet protocol television (IPTV) service or use a virtual private network (VPN) to stream or download this content.
\n
Figure 1: An example of blocked content
\n

\n
\n
Identify two hardware devices that Rajesh could use to view his internet protocol television (IPTV) channels.
\n
[2]
\n
a.i.
\n
\n
Identify two features of a virtual private network (VPN).
\n
[2]
\n
a.ii.
\n
\n
Identify two features of a protocol.
\n
[2]
\n
a.iii.
\n
\n
Explain why Rajesh downloaded films rather than streaming them when he was travelling.
\n
[4]
\n
b.i.
\n
\n
Rajesh has been told that subscribing to an internet protocol television (IPTV) service may compromise his anonymity.
\n
Distinguish between anonymity and privacy.
\n
[2]
\n
b.ii.
\n
\n
To what extent is it acceptable for Rajesh to use services like a virtual private network (VPN) to access content that may be blocked in the country he is visiting?
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Smart TV
\n- Mobile phone/cellphone
\n- Tablets
\n- PC/laptop
\n- IPTV box (such as an Amazon Fire stick, Apple TV, etc.)
\n
\n
Award [1] for each hardware device identified that Rajesh could use to view his IPTV channels up to [2].
\n
Do not accept monitor or television.
\n
a.i.
\n
\n
Answers may include:
\n
\n- A private [IP] address on a public network
\n- Masks the user’s IP address
\n- Provides an encrypted connection
\n
\n
Award [1] for each feature of a VPN identified up to [2].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- A set of rules that govern the communication of information.
\n- The rules govern what information is communicated / the format of the information.
\n- The rules govern how/when the information is communicated / transmitted (between devices on the same network).
\n
\n
Award [1] for each feature of a protocol identified up to [2].
\n
a.iii.
\n
\n
Answers may include:
\n
\n- Films can be played offline / no internet connection is needed to play downloaded films / device connects to the source file and downloads to the hard drive.
\n- The downloaded files can be transferred to other devices.
\n- The film quality is intact.
\n- The downloaded files can be viewed in countries with restricted internet access.
\n- Streaming depends on the internet bandwidth, which may fluctuate.
\n- There may be film pauses due to buffering, especially with slow internet connections when streaming.
\n
\n

\n
b.i.
\n
\n
Answers may include:
\n
\n- Anonymity is knowing what activities are being carried out but not knowing who is carrying them out.
\n- Privacy is knowing who the person carrying out the activities may be but not knowing what these activities are.
\n
\n
Award [1] for each appropriate statement that distinguishes anonymity from privacy up to [2].
\n
b.ii.
\n
\n
Answers may include:
\n
Reasons why Rajesh should use services like a VPN:
\n
\n- The service is legitimate and cannot be accessed by any other means.
\n- Rajesh may believe that the blocking of the service is unlawful / inappropriate / the degree of censorship/surveillance is draconian.
\n- There may be technical advantages of using a service like a VPN (systems).
\n- Through a VPN, Rajesh can browse the web in complete anonymity (systems).
\n- Rajesh may find media access through a VPN more economical compared with subscribing to the same services in a different country (regulations, ISP).
\n
\n
Reasons why Rajesh should not use services like a VPN:
\n
\n- Rajesh should abide by the laws of the country and by circumventing the laws may place himself at risk.
\n- The content may be deemed to be inappropriate in the host country and has been blocked for religious / security / political reasons (values).
\n- The use of a VPN may reduce the speed of downloading or streaming (systems).
\n- Rajesh may not be able to download or stream films despite having a subscription to a VPN because a few broadcasting apps use anti-VPN technology to restrict content outside a specific region.
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: employment, VPN, censorship, surveillance, anonymity, privacy, laws, regulations, change, power, systems, values, ethics
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "21N.1.SL.TZ0.1",
"topics": [
"topic-3-content",
"topic-2-concepts"
],
"subtopics": [
"3-3-computers",
"3-4-networks-and-the-internet",
"3-1-data",
"3-5-media",
"2-1-change"
]
},
{
"Question": "\n
A cashless society
\n
In the near future, it is possible that cash will not be accepted as a means of payment in Sweden. People are already using alternative ways of paying, such as mobile payment, card payment and internet payment. Currently, over 95% of citizens in Sweden have internet access.
\n
Many people in Sweden claim there are advantages of using an app developed by Swish. The Swish app allows friends to share a restaurant bill, pay where credit or debit cards are not accepted, for babysitting or parking tickets, or make a donation at church.
\n
However, other people in Sweden claim that making the Swish app the only means of payment may increase inequalities within the country.
\n
Discuss whether countries should pass legislation making apps such as Swish the only means of payment.
\n
",
"Markscheme": "\n
Answers may include:
\n
Benefits of apps such as Swish being the only form of payment (claim)
\n
\n- No need to carry cash (digitalization) / credit cards – no risk of being stolen/no risk of not having enough cash.
\n- No risk of credit card being used fraudulently (values).
\n- Transactions are recorded – there is proof of payment, and the system should increase transparency / acceptability.
\n- Payments are made immediately – no need to wait until person has time to go to bank to get cash (feasibility).
\n- Can solve other problems regarding money – bills can be shared, one person pays, and money is transferred (feasibility).
\n- In an emergency, money can be transferred to dependents without them being close (e.g., children at university) (feasibility).
\n- Allows money transactions between individuals.
\n- Can limit the amount of money to be transferred, thus preventing individuals spending more than they have available (acceptability / feasibility).
\n- Many people are already used to the app, so it would be a good choice if the country were going cashless (acceptability).
\n- Easier for users to track budgets / spending, as all transactions are digital (transparency).
\n
\n
Disadvantages of apps such as Swish being the only form of payment (counter-claim)
\n
\n- Swedish banks will be able to obtain more data on their users’ transaction habits (privacy concern, ethics, values).
\n- Is not available to people who do not have a bank account, so a potential digital divide concern (equity).
\n- May be problematic for tourists who may not have the app or who cannot link the purchase to their bank account (systems, equity).
\n- Removes the anonymity of the payee in transactions – the app may store a user’s transaction history. This would include date, item, recipient of the money and cost of the item (values, ethics).
\n- The bank controls (power) the maximum amount of money that can be transferred, which may limit a person’s spending and may not be appropriate in certain situations (acceptability).
\n- It may not be technically possible to make the transition from a society that uses cash for transactions to one that does not (change, systems).
\n- If a single app is used, it would give Swish an unfair monopoly over the technology (power, values, ethics).
\n- \nDigital divide – smartphone ownership and use by mature adults.
\n- If a person loses their phone, breaks it, or its battery runs out, they have no way to pay for anything (systems, equity).
\n- Failure in / lack of phone network coverage could affect when and where people could use the app (systems, equity).
\n- Failure of the system / technical issues / down time would prevent people from making transactions (systems, feasibility).
\n
\n
\n
Accept implicit and explicit references to apps such as the Swish app.
\n
In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: business, families, digital divide, access, inclusion, acceptability, feasibility, equity, digitalization, anonymity, privacy, change, power, systems, values, ethics
\n
\n
Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "21M.1.HL.TZ0.5",
"topics": [
"topic-1-introduction"
],
"subtopics": [
"1-1-what-is-digital-society"
]
},
{
"Question": "\n
Students should be provided with the pre-release document ahead of the May 2018 HL paper 3 examination, this can be found under the \"Your tests\" tab > supplemental materials > May 2018 HL paper 3 pre-release document: Accessibility.
\n
\n
Improving the accessibility to the curriculum for children with special educational needs and disabilities (SEND)
\n
\n
Source 1: Tayton School
\n
Tayton School is a primary school that teaches 500 children aged between 5 and 12. There are three classes in each year group, with a maximum of 24 students in each class. The school’s motto is “Education for Everyone”, and inclusion is at the heart of the school’s mission.
\n
The school’s Inclusion Department consists of five full-time staff, led by Sandra, and 10 learning support assistants who are active in working with the children. Sandra has recently produced a report on the students with special educational needs and disabilities (SEND) in the school, in which she found that the increasing numbers of students, and the types of SEND, means that the schools needs to invest in expanding the amount of support for the students (see Table 1).
\n
Table 1: SEND at Tayton School
\n

\n
Sandra’s report argues that, next year, the work of the Inclusion Department would be more effective if the school purchased educational digital technologies, such as social robots and assistive technologies.
\n
\n
Source 2: Social robots in education
\n
Sandra researched social robots and came back to the department meeting with this information:
\n
In 2020, a report on the use of social robots in education was published by a prestigious university professor, who concluded that social robots have the potential to be a key player in education in the way textbooks and whiteboards have been in the past. A social robot has the potential to support students in ways that could never have been envisaged 20 years ago. However, there are significant technical limitations, particularly linked to the social robot’s ability to interact with students, that will restrict their usability for the next few years
\n
\n
Source 3: Mary sees the positives
\n
Mary, one of the learning assistants at Tayton School, says:
\n
“As a parent of two school-age children, I think the potential introduction of social robots has both advantages and disadvantages. My children thought the idea of having a robot that sits with them very exciting, and I think they would do what the robot asks without questioning it. The robot will also be much more patient while they are learning their times tables!” (See Figure 1).
\n
Figure 1: Students interacting with a social robot
\n

\n
[Source: pexels.com]
\n
\n
Source 4: James has doubts
\n
James, another learning assistant at Tayton School, is wary of the overuse of digital technology in schools for children with special needs based on his experiences in other schools. He has found some research that supports his ideas.
\n

\n
[Source: pexels.com]
\n
\n
With reference to the stimulus material and your own inquiries, recommend whether Tayton School should use social robots and/or assistive technologies to ensure students with SEND can be further integrated into the school.
\n
",
"Markscheme": "\n
Answers may include:
\n
Evaluation of social robots
\n
Equity:
\n
\n- With inadequate budget, there may not be enough social robots in Tayton School to support the number of students with SEND (Source 1).
\n- With careful planning/timetabling, social robots could be made accessible to the students in class.
\n- Social robots may not meet the needs of all students, e.g., students with speech problems may not be able to effectively interact with the social robots (access, inclusion).
\n- Social robots can be fitted with alternative input technologies, e.g., wearable sensors or touch screens.
\n- Different social robots are designed for different students’ needs and are not generic.
\n
\n
Acceptability:
\n
\n- Students are excited for the social robot to be with them (Source 3).
\n- Research has shown that students are accepting of social robots because they have been designed with human features /expressions.
\n- Robots can use facial recognition to help identify the student and provide a personalized interaction.
\n- Adults are more cautious about accepting robots in the classroom, and therefore parents may be less trusting of a robot compared with a human tutor.
\n
\n
Cost:
\n
\n- The cost of the social robots has reduced and is now more affordable, with commercial products that can be bought off the shelf for US$500.
\n- Additional costs are needed to maintain the robots, e.g., over time batteries can degrade, they will need internet access (which may require the school to purchase additional network data), robots may need software upgrades (which may require technology specialists).
\n- Social robots would be desirable to students, and therefore may be stolen and need replacing.
\n- Students with emotional needs may be aggressive and damage the social robots, which will need repairing/replacing.
\n- Social robots could replace human learning assistants, which could be cheaper in the long run (automation).
\n
\n
Feasibility:
\n
\n- The number of students that would need to use the social robots (Source 1) would require more than a few social robots, which is expensive.
\n- Technical limitations, speech recognition, and social interaction (Source 2).
\n- Social robots are technically feasible – there are sufficient educational robots on the market that can be used by Tayton School.
\n- Social robots could be used in the classroom, which provides suitable terrain for it to function. With sufficient charging and internet access, social robots are feasible in the classroom.
\n
\n
Innovation:
\n
\n- Although relatively new, there are research papers that analyse the effectiveness of robots in education.
\n- Artificial intelligence and robotics developments are improving performance.
\n- The innovation is designed to support teachers and therefore enhance learning, rather than replace teachers.
\n
\n
Ethics:
\n
\n- \nPolicies need to be put in place in the school to outline the acceptable use of social robots in the classroom.
\n- \n Policies need to include the responsibilities of the classroom teacher when using the social robot with a group of children and expected behaviour.
\n- \nPrivacy concerns regarding the collection, storage, use, and access of data collected by the robot.
\n
\n
\n
Evaluation of assistive technology
\n
Equity:
\n
\n- Assistive technology in hardware form is specific to the needs of the student – a range of technologies would need to be employed for the different needs.
\n- Assistive technology improves accessibility and access to learning.
\n- Assistive technology in the form of apps on tablets or laptops can be accessible to many children, e.g., one tablet could include apps for all learning needs.
\n
\n
Acceptability:
\n
\n- Unrealistic expectations and disappointment by staff (Source 4) (technical determinism).
\n- Assistive technologies are more acceptable in the community, as they have been established for many years, e.g., braille keyboards are widely known.
\n- Assistive technologies alone may not be useful unless they are fully accepted and integrated into the learning by the teacher.
\n- Parents may not be happy with the increase in screen time for their children spending more time at school on a tablet/mobile device (values).
\n- Assistive technologies through apps on mobile devices may not be as accepted by the students compared to interacting with a social robot.
\n
\n
Cost:
\n
\n- High-tech hardware assistive technologies can be expensive and can only be used by students with a specific need (they are not general).
\n- Low-tech apps/website subscriptions, e.g., apps for general learning disabilities, can be relatively cheap because they can be shared among many users.
\n- Apps/website subscriptions that provide personalized learning are more expensive and require individual licensing per person (access, inclusion).
\n
\n
Feasibility:
\n
\n- Not enough consideration is given to how assistive technology will work in a busy school environment (Source 4).
\n- The school may already have mobile devices for learning in the classroom connected to the internet, making assistive technologies (apps) easy to implement (systems).
\n- Time constraints make it difficult for a teacher to fully plan for using the assistive technologies.
\n- \nTraining is important for effective use of assistive technology, requiring both time and training.
\n- The school may already have in place policies for technology, e.g., an acceptable use policy.
\n- The school’s mission focuses on inclusion, and the provision of the assistive technologies supports this mission.
\n
\n
Innovation:
\n
\n- Assistive technologies can mitigate the challenges that students with SEND face with their learning.
\n- Assistive technologies can be used to enhance the teaching and learning of students.
\n- There are a wide range of assistive technologies; these must be reviewed, tried, and tested before purchasing (systems).
\n- Teachers need professional development and training before the integration of assistive technologies in the classroom can be effective.
\n
\n
Ethics:
\n
\n- \nPrivacy concerns exist with the use of personalized apps, as they collect data from interactions. The school must ensure the apps comply with data protection policies. \n
\n
\n
The recommendation:
\n
\n- Using the evaluations of each intervention, the response needs to recommend one or the other, or a combination of both.
\n- The recommendation needs to explicitly balance the evaluations against each other in order to support the recommendation and to satisfy the requirement that possible trade-offs and implications have been considered.
\n- The trade-offs and implications will need to consider which of the evaluation points is more important than the others.
\n
\n
\n
Keywords: identity, ethics, systems, values, data, privacy, policies, app, facial recognition, trust, social robot, assistive technologies, hardware, automation, relationships, accessibility, access, inclusion, equity, acceptability, cost, feasibility, innovations, technological determinism.
\n
\n
Please refer to the HL paper 3 question 4 markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "18M.3.HL.TZ0.4",
"topics": [
"topic-2-concepts"
],
"subtopics": [
"2-1-change"
]
},
{
"Question": "\n
Using a Segway with machine learning capabilities?
\n
The Segway Patroller is a two-wheeled, battery-powered electric vehicle. Recently, Segway Patrollers have been used for security purposes in cities as well as in public spaces such as concerts, railway stations and shopping malls.
\n
The Segway Patroller can travel up to a speed of 20 kilometres per hour (about 12 miles per hour) and travel about 40 kilometres (25 miles) in distance before the battery needs to be recharged.
\n
Figure 3: A Segway Patroller
\n

\n
[Copyright: Urban Mobility GmbH – from https://en.wikipedia.org/wiki/File:Segway_Polizei_4.jpg]
\n
Each Segway Patroller can be customized by adding the following features.
\n
\n- A global positioning system (GPS)-based navigation system
\n- Machine learning capabilities that include speech, image and pattern recognition
\n
\n
The managers at Oliverstadt Station claim the introduction of upgraded Segways that have a GPS navigation system and machine learning capabilities would lead to improvements in the customer service provided.
\n
Discuss whether the Segway Patrollers at Oliverstadt Station should be upgraded to include machine learning capabilities.
\n
",
"Markscheme": "\n
Answers may include:
\n
Reasons for upgrading the Segway Patrollers to include machine learning capabilities (claim):
\n
\n- It will not require staff to have such a good knowledge of the geography of the train station and will reduce staff training costs (intuition, judgement, feasibility).
\n- The routes selected by the Segway will be the most efficient ones.
\n- Routes can be predetermined, and the route-finding algorithm can be programmed to avoid possible collisions / create a one-way system / accommodate peculiarities in the flow of passengers in the train station (systems, feasibility).
\n- If a platform changes at very short notice the user only has to type in the new location and the route-finding algorithm will be able to adapt the route used (automation).
\n- Management would be able to monitor the location of the staff because the Segway will be constantly communicating with the navigation centre and may make cost savings (values, ethics).
\n
\n
Reasons for not upgrading the Segway Patrollers to include machine learning capabilities (counter-claim):
\n
\n- If there is an accident involving a Segway, who would be accountable?
\n- The constant upgrading of the software may not have been tested thoroughly, so the autonomous nature of the Segway may not be as effective as intended (reliability, feasibility).
\n- The particular nature of Oliverstadt train station may mean that the algorithms used in route finding could conflict with the movement of passengers and may cause problems that can be avoided by having a human in control (acceptability).
\n- The movement of passengers within the train station may not fit clearly defined patterns, so matching the patterns of passenger movements may be problematic and the algorithms may not provide the optimal solution (systems).
\n- Train stations have to change the platforms that the trains leave at very short notice. Will the route-finding algorithm be able to respond immediately to these changes?
\n- There may be considerable costs in terms of time and costs in determining the most appropriate algorithms, which are not compensated for by the reduction in staff costs / or efficiencies gained by autonomous Segways.
\n- The human “pilots” of the Segway may have particular skills, such as linguistic abilities, that are not utilized when the dispatching of the Segway is more automated (systems).
\n- The Segway may collect information about passenger movements that is not made known to them, a lack of transparency or possibly surveillance (values, ethics).
\n
\n
\n
In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: automation, connectivity, change, power, control, systems, values, ethics, machine learning, accountability, transparency, autonomy, surveillance, monitoring, algorithm, reliability, cost, feasibility
\n
Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "17N.1.HL.TZ0.5",
"topics": [
"topic-5-hl-extension"
],
"subtopics": [
"5-1-global-well-being"
]
},
{
"Question": "\n
The human face of student counselling
\n
Many Diploma Programme (DP) coordinators are finding they do not have enough time to interview every student before they choose their DP subjects. They are considering purchasing the Student Counselling System, a proprietary management information system (MIS).
\n
The developers of the Student Counselling System claim that, if students complete online questionnaires to determine their interests, abilities and future goals, the system can give them very accurate results, resulting in less than 5% of students changing their diploma subjects. They also claim the Student Counselling System will allow DP coordinators to be able to interview every student, something they cannot do now.
\n
Some DP coordinators have concerns about the automation of this process and believe that advising students is something that is best done by relying on their own professional judgement and intuition.
\n
Discuss whether DP coordinators should rely on the recommendations of the Student Counselling System rather than their own professional judgement and intuition when advising students about what DP subjects to study.
\n
",
"Markscheme": "\n
Answers may include:
\n
Reasons why DP coordinators should rely on the recommendations of the Student Counselling System (claim):
\n
\n- If a large number of decisions based on a wide range of scenarios are programmed into the Student Counselling System, it should give accurate and reliable results (systems, feasibility).
\n- Students may be able to carry out initial investigations themselves to determine whether their proposed choices are realistic (judgement).
\n- If many of the scenarios are similar, the DP coordinator may be able to see a number of students together to give general advice, making the process more efficient.
\n- Students may appreciate the consistency / transparency of the information provided by the Student Counselling System (equity).
\n- In many cases, the scenario may be relatively straightforward, and the Student Counselling System may be able to provide consistent information that the DP coordinators would have in a fraction of the time, allowing them to focus on the students who do have atypical requirements (feasibility, costs).
\n
\n
Reasons why DP coordinators should rely on their judgement (counter-claim):
\n
\n- DP coordinators know that special circumstances / family issues / personal information can have an impact on the decision and this will require their professional judgement, intuition, values and ethics.
\n- They may encounter scenarios that are not part of the system, which limit its usability / feasibility.
\n- DP coordinators might be aware of new subjects/majors that have not been updated into the system (change).
\n- Students may have multiple interests, and the Student Counselling System cannot give accurate recommendations.
\n- Giving career advice is too important to be left to the algorithms that exist within the Student Counselling System (values, ethics).
\n
\n
\n
In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: automation, change, power, systems, values, ethics, judgement, intuition, consistency, transparency, efficiency, algorithm, accuracy, reliability, equity, costs, feasibility
\n
Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "17N.1.HL.TZ0.6",
"topics": [
"topic-5-hl-extension"
],
"subtopics": [
"5-1-global-well-being"
]
},
{
"Question": "\n
Medical centre budgets
\n
Dr Schultz is the head doctor and manager at the Okavango Medical Centre in the Republic of Botswana. This medical centre is located eight hours away from the capital city, Gaborone. The medical centre is able to cope with routine cases, but when the doctors at the centre encounter an unusual case, they have to communicate with specialists at the main hospital in Gaborone using either a cellphone or voice over internet protocol (VOIP).
\n
Currently, the Okavango Medical Centre does not have any medical equipment connected to the information technology (IT) systems at the hospital in Gaborone in real time. This makes it hard to give the necessary information to specialists in Gaborone when there are unexpected changes in a patient’s condition. Because of this, at times Dr Schultz has to ask a specialist doctor from Gaborone to visit the Okavango Medical Centre to carry out treatment.
\n
The area is becoming popular with tourists, and Dr Schultz is concerned that the doctors and nurses at the Okavango Medical Centre will be unable to treat the increasing number of patients. He believes Okavango Medical Centre needs better equipment in order to improve patient care.
\n
The IT staff at the Okavango Medical Centre created a database of the treatments carried out by the centre. Figure 1 shows an example of the form used to enter data.
\n
Figure 1: Example of a form used to enter patient data
\n

\n
\n
Identify two characteristics of voice over internet protocol (VOIP).
\n
[2]
\n
a.i.
\n
\n
Identify two reasons why staff at the Okavango Medical Centre would use a form to enter patient data into the database.
\n
[2]
\n
a.ii.
\n
\n
Outline one reason why the Okavango Medical Centre would use a relational database for the patients’ records.
\n
[2]
\n
a.iii.
\n
\n
Dr Schultz has arranged to speak to the local authority in an attempt to get more funding for the medical centre. He intends to use presentation software to create a multimedia presentation to support this speech. Dr Schultz is aware that many people in the audience are annoyed when slideshows are poorly designed.
\n
Explain three design errors Dr Schultz should avoid when creating his multimedia presentation slideshow for the local authority.
\n
[6]
\n
b.
\n
\n
The Okavango Medical Centre has received additional funding from the local authority. The centre is investigating the possibility of using these funds to purchase IT equipment that would allow surgeons in Gaborone to carry out surgery remotely.
\n
Evaluate the impact of the purchase of this IT equipment on the medical centre and its patients.
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Communication using internet / internet applications / one example such as Skype, Zoom, Google Hangouts, WhatsApp, etc.
\n- Communication carried out using the internet.
\n- May take the form of voice or multimedia.
\n- Communication / conferencing with many people at the same time.
\n- Communication is synchronous / transmitted in real time.
\n
\n
Award [1] mark for identifying each characteristic of voice over internet protocol (VOIP) up to a maximum of [2] marks.
\n
a.i.
\n
\n
Answers may include:
\n
\n- To provide an intuitive/user-friendly interface.
\n- Allows the user interface to be customized, such as by adding additional information to support the user.
\n
\n
Award [1] mark for identifying each reason why staff at the Okavango Medical Centre would use a form to enter patient data into the database up to a maximum of [2] marks.
\n
a.ii.
\n
\n
Answers may include:
\n
\n- Data would only need to be entered in one place…
\n- which would prevent problems such as data redundancy and update anomalies.
\n
\n
Award [1] mark for identifying a reason why the Okavango Medical Centre would use a relational database and [1] mark for an explanation why it is a problem up to a maximum of [2] marks.
\n
a.iii.
\n
\n
Answers may include:
\n
Small font size
\n
\n- Dr Schultz should avoid using a small font that makes the text difficult to read…
\n- or results in too much text on a slide, reducing its effectiveness.
\n
\n
Excessive/inappropriate transitions
\n
\n- Dr Schultz should ensure that the nature of the transition is appropriate for the audience.
\n- In this case, he should avoid excessive flying in, etc.
\n
\n
Too many slides
\n
\n- Too many slides can mean that the slides do not remain visible long enough for the audience to engage with them…
\n- or the key points associated with each slide become blurred in the overall message.
\n
\n
Poor choice of colours
\n
\n- Dr Schultz needs to ensure the mix of colours makes the slides easy to read…
\n- therefore, may want to avoid certain combinations, such as red or green, that may cause some of the audience difficulty in reading the information.
\n
\n
Inappropriate language
\n
\n- Dr Schultz should ensure the language used is appropriate for the intended audience.
\n- This should ensure that overly complex terms or specialist medical terminology is not used.
\n
\n
Inappropriate or overuse of multimedia
\n
\n- It may be appropriate to incorporate a video (e.g., interview with a patient)…
\n- but irrelevant music/videos can be annoying and detract from the message.
\n
\n
Inconsistent formatting throughout the presentation
\n
\n- The presentation is not consistent.
\n- The clarity of the message is lost.
\n
\n
\n
N.B.: The response requires an identification of a common design error followed by an explanation of why it is a problem. If no design error is mentioned but from the explanation it can be determined this should be credited.
\n
Award [1] mark for identifying a common design error and [1] mark for an explanation why it is a problem up to a maximum of [2] marks.
\n
Mark as [2] + [2] + [2].
\n
b.
\n
\n
Answers may include:
\n
Advantages of purchasing more IT equipment so that operations can be carried out remotely:
\n
\n- Specialized surgeries (e.g. cardiac) can be done remotely, improving medical care.
\n- Adding specialist surgeons to this type of clinic would be expensive and inefficient, as there would be a limited number of cases for them.
\n- The doctors in Okavango could assist in and/or observe the surgery, thus improving their general surgical skills/gaining medical training.
\n
\n
Disadvantages of purchasing more IT equipment so that operations can be carried out remotely:
\n
\n- The internet connection (bandwidth) may not be sufficient to support remote-controlled surgery because the surgery requires high-tech video and phone links.
\n- \nLatency in the connection is also a safety issue. Lag times can cause serious errors.
\n- The remote surgery equipment may not be used frequently enough to justify the expense / it might be wiser to spend the money on other medical needs.
\n- Patients in the area might be uncomfortable with the idea of a remote-controlled robot carrying out surgery (trust).
\n- The data will need to be encrypted to protect patient privacy (security).
\n- Robotic surgery would use public networks, raising security concerns (including hacking).
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: health, medical care, training, trust, privacy, network, bandwidth, change, systems, values
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "18M.1.SL.TZ0.1",
"topics": [
"topic-3-content",
"topic-2-concepts"
],
"subtopics": [
"3-4-networks-and-the-internet",
"3-1-data",
"2-1-change"
]
},
{
"Question": "\n
Meet Dennis, the restaurant service robot
\n
Figure 3: Dennis, the restaurant robot Figure 4: The user interface on Dennis
\n

\n
SingBot Robotics has developed a service robot called Dennis. A large restaurant chain, Gustavo’s, has recently purchased a number of Dennis robots to use as waiters for one of its restaurants in Singapore (see Figure 3).
\n
Customers can give Dennis their orders in two ways:
\n
\n- They can talk directly to him, in which case Dennis uses pattern recognition to distinguish menu items ordered.
\n- They can enter their choice directly on a touch screen (see Figure 4).
\n
\n
When the order is ready, Dennis collects it from the kitchen and brings it to the table. Customers can pay by swiping their credit card above Dennis’s card reader.
\n
The marketing manager at Gustavo’s has said that the robots improve the convenience and efficiency of the ordering process. She added, “In their feedback, customers tell us that Dennis makes their experience more memorable.”
\n
The managers at Gustavo’s are considering the introduction of Dennis robots in all their restaurants.
\n
\n
Identify two sensors that Dennis needs in order to operate successfully in the restaurant.
\n
[2]
\n
a.i.
\n
\n
Identify two methods that the marketing manager at Gustavo’s could use to collect feedback from customers about Dennis.
\n
[2]
\n
a.ii.
\n
\n
Identify two characteristics of a social robot.
\n
[2]
\n
a.iii.
\n
\n
Customers speak to Dennis to give him their orders. Dennis uses natural language processing to understand what has been said to him.
\n
Explain three reasons why Dennis may not be able to understand what customers are saying to him.
\n
[6]
\n
b.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Proximity
\n- Sound/speech
\n
\n
Award [1] for identifying each sensor up to a maximum of [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- Questionnaire/survey
\n- Interview
\n- Observe Dennis interacting with customers
\n- Provide a space on the website for comments about the customer’s experience
\n- Place a suggestions/opinions journal at the exit of the restaurant
\n- Use the robot to ask if they enjoyed the experience or not
\n
\n
\n
Award [1] for identifying each method that the marketing manager at Gustavo’s could use to collect feedback from customers about Dennis robots up to a maximum of [2].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- It can carry out tasks that require personal interactions with humans.
\n- It can engage in two-way interactions with humans.
\n- They are used to provide a technological solution to a short-term problem.
\n
\n
\n
Award [1] for identifying characteristic of a social robot up to a maximum of [2].
\n
a.iii.
\n
\n
Answers may include:
\n
\n- Customers may have muffled speech due to masks, visor wearing or bad diction.
\n- Dennis may only be calibrated for one particular dialect, such as English spoken in England, or be unable to recognize rarely heard accents/non-standard dialects.
\n- Customers may use colloquialisms, slang, sarcasm, irony, informal phrases, expressions, homonyms and synonyms that Dennis is unable to comprehend.
\n- Customers may use languages where not much data has been collected and Dennis is unable to understand what they are saying or communicate with them.
\n
\n

\n
b.
\n
",
"Examiners report": "",
"question_id": "18N.1.SL.TZ0.4",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-7-robots-and-autonomous-technologies",
"3-1-data",
"3-6-artificial-intelligence"
]
},
{
"Question": "\n
Artificial intelligence (AI) predicts earthquakes
\n
Scientists at universities are developing a machine learning system to detect the warning signs that an earthquake is likely to occur. Using pattern-recognition algorithms similar to those in image and speech recognition, the system would be able to predict earthquakes a few days before they occur. Using machine learning, researchers will be able to run earthquake analysis 500 times faster than they could previously.
\n
It is also possible to use machine learning to predict where the aftershocks* of an earthquake may occur (see Figure 4).
\n
Figure 4: Prediction of aftershocks using machine learning
\n
\n
\n
* aftershock: a smaller earthquake that follows a large earthquake
\n
\n
Identify two characteristics of pattern recognition.
\n
[2]
\n
a.i.
\n
\n
Outline one reason why it might be difficult to collect accurate data that can be used for predicting earthquakes.
\n
[2]
\n
a.ii.
\n
\n
Identify two characteristics of an algorithm.
\n
[2]
\n
a.iii.
\n
\n
Scientists used visualizations, such as in Figure 4, to present the information about predicted earthquake activity.
\n
Analyse the decision to use visualizations.
\n
[6]
\n
b.
\n
\n
Discuss the advantages and disadvantages of using machine learning to predict natural disasters like earthquakes.
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Identifies familiar patterns and objects.
\n- Recognize shapes and objects from different angles.
\n- Uses mathematical methods.
\n- Is a branch of machine learning.
\n
\n
\n
Award [1] for each characteristic of machine learning identified up to [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- Data might be limited / not enough data points collected – may reduce the effectiveness of the machine-learning model.
\n- Reliability of hardware – e.g., sensors/software used in collecting the data.
\n
\n
\n
Award [1] for a limitation of collecting data for predicting earthquakes and [1] for a development of that limitation up to [2].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- A set of rules…
\n- that are followed by a computer in problem-solving.
\n \n
\n
\n- A sequence of unambiguous instructions…
\n- with a finite number of steps…
\n- that are clear and essential.
\n
\n
\n
Award [1] for each characteristic of an algorithm identified up to [2].
\n
a.iii.
\n
\n
Answers may include:
\n
Advantages of visualizations:
\n
\n- Presents complex information clearly.
\n- Makes it easier for non-experts to understand patterns/trends/anomalies in the data.
\n- Visualizations are easier to process than text.
\n- May lead to more efficient / more rapid decision-making.
\n
\n
Disadvantages of visualizations:
\n
\n- May present an overly superficial picture that may not address the key patterns/trends/anomalies in the data.
\n- The design of the visualization may introduce data bias (either intentional or unintentional) that gives misleading information.
\n- The visualization may not be effective.
\n- May not give sufficient information on its own to make an appropriate decision
\n
\n

\n
b.
\n
\n
Answers may include:
\n
Reasons why machine learning should be used to predict natural disasters:
\n
\n- Machine learning learns from previous experiences (systems).
\n- It can easily analyse patterns from previous experiences (systems).
\n- AI can be trained to analyse patterns of natural disaster to predict future occurrences.
\n- Access to vast amounts of data can make predictions more accurate (algorithms, systems).
\n- Access to worldwide data will lead to better predictions (values).
\n- The system becomes more accurate as more data is collected over time (systems).
\n- It can analyse large amounts of data, so decisions will be based on greater information (systems).
\n- It can detect non-linear relationships within data and provide more information.
\n- It can detect all possible interactions between variables.
\n- It can eliminate human error – incorrect information.
\n- It can react faster than a human to incoming data.
\n- The recommendations are likely to be based on the greatest data set possible.
\n- They will be updated instantaneously.
\n
\n
Reasons why machine learning should not be used to predict natural disasters:
\n
\n- The quantity of data collected may be limited – not enough data to make predictions.
\n- The algorithm may not be accurate – causes errors in predictions.
\n- Predictions may not be accurate / reliable due to geographical differences/locations.
\n- Prediction cannot take into account new scenarios (for the first time) / missing data.
\n- The recommendations may be generic / be based on algorithmic biases and not be sufficiently customized to each natural disaster (values).
\n- There may be particular characteristics of the natural disaster that the AI system may not be able to understand (systems).
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: natural disasters, environment, data, algorithms, accuracy, reliability, change, systems, values, ethics
\n
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "21N.1.SL.TZ0.4",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-1-data",
"3-6-artificial-intelligence",
"3-2-algorithms"
]
},
{
"Question": "\n
Smart farming
\n
A government in East Africa is using the expertise of scientists at a university in the region to promote the culture of smart farming and increase the productivity of farmers (see Figure 5). To do this, they have developed an app that the farmers can use to assist them in their decision-making.
\n
Figure 5: An example of farming in East Africa
\n

\n
[Palmer, N., 2010. A farmer at work in Kenya’s Mount Kenya region [image] [online] Available at: https://commons.wikimedia.org/wiki/File:2DU_Kenya_86_(5367322642).jpg (CC BY-SA 2.0) https://creativecommons.org/licenses/by-sa/2.0/deed.en [Accessed 18 May 2020].]
\n
Unfortunately, the scientists who developed the app have received many complaints from farmers who have been unable to use it. They are considering two options:
\n
\n- making the existing system more user-friendly
\n- educating the farmers to use the existing system.
\n
\n
The scientists claim by making changes to the app it will make the app more user-friendly for the farmers. However, the farmers claim it would be better to provide them with education, such as training, so they can use the existing app.
\n
Evaluate these two claims.
\n
",
"Markscheme": "\n
Answers may include:
\n
Intervention 1: Making the system more user-friendly (claim)
\n
Advantages of making the system more user-friendly:
\n
\n- May only require minimal adjustments to the interface (feasibility / systems).
\n- Can probably be done in the short term, so will have a more immediate impact.
\n- Will require little or no training of farmers, so cheaper than providing training, which may involve the development of online training sites (systems) or require farmers to travel to a college (cost, feasibility).
\n- May require less testing before the improved interface is introduced (systems, cost).
\n
\n
Disadvantages of making the system more user-friendly:
\n
\n- Famers may use it as it is fit for purpose and may not use all of the functionality that the app provides (acceptability).
\n- The redesign of the digital system may not be any improvement on the current one (innovation, technological determinism, feasibility).
\n- The redesign of the digital system may not be cost-effective.
\n
\n
\n
Intervention 2: Educating the farmers to use the existing system (counter-claim)
\n
Advantages of educating the farmers to use the existing system:
\n
\n- Will provide a longer-term solution that will be beneficial over a longer period of time.
\n- May provide other benefits, as farmers become more tech savvy and are able to use other apps developed by this university or other universities (acceptability).
\n
\n
Disadvantages of educating the farmers to use the existing system:
\n
\n- May give farmers a greater ownership of the initiative/innovation (values).
\n- Farmers may not be able to spare the time to carry out the training/may not want to carry out the training/be appreciative of a functional app (values).
\n
\n
\n
In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: agriculture, training, education, innovation, costs, apps, networks, change, power, systems, values, ethics, feasibility
\n
Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "21N.1.HL.TZ0.5",
"topics": [
"topic-5-hl-extension"
],
"subtopics": [
"5-1-global-well-being"
]
},
{
"Question": "\n
Smart warehouse
\n
Greenwood Industries’ warehouse uses a smart storage solution for the picking of products from the shelves of the warehouse. Robots are used in this automated picking process.
\n
Currently, these robots are programmed to access a knowledge base* that enables these robots to use the most efficient route for the picking of products.
\n
Greenwood Industries claims the picking process would be improved if the expert system was replaced by an artificial neural network (ANN).
\n
Discuss whether Greenwood Industries should replace the existing system with one that uses an artificial neural network (ANN).
\n
\n
* knowledge base: a set of rules that are manually input into an expert system.
\n
\n
",
"Markscheme": "\n
Answers may include:
\n
Reasons why Greenwood Industries should replace the expert system with an artificial neural network (ANN) (claim):
\n
\n- May provide greater flexibility in the decision-making process, as knowledge bases only use binary logic (0 or 1, true or false) (algorithms).
\n- The ANN may be able to learn and be more flexible than the expert system (systems, innovation).
\n- The ANN may be more flexible than using an expert system, as the changes to the knowledge base (or equivalent) will be easier to effect (systems, acceptability).
\n- It further automates decision-making – will make the warehouse more efficient (systems, costs).
\n- It learns to recognize patterns – adapts to new situations – increase efficiency (systems).
\n- Increased accuracy in decision-making – takes into account external factors (systems).
\n- The ANN can function if there is some data missing (systems, acceptability).
\n
\n
Reasons why Greenwood Industries should not replace the expert system with an artificial neural network (ANN) (counter-claim):
\n
\n- It will be harder to implement a new system – so the switch to ANNs will require support (systems, values, feasibility).
\n- It will require development costs to introduce a new system that Greenwood Industries may not be able to recoup (systems, costs).
\n- The problem may not require an ANN. It may be an example of technological determinism (values).
\n- There may not be the hardware / processing capabilities for the ANN (systems, feasibility).
\n- Would this lead to further redundancies / increasing automation of employment / loss of human decision-making (ethics, values)?
\n
\n
\n
In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: automation, training, costs, algorithms, artificial neural networks, machine learning, automation, change, systems, values, ethics, cost, feasibility
\n
Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "21N.1.HL.TZ0.6",
"topics": [
"topic-2-concepts"
],
"subtopics": [
"2-1-change"
]
},
{
"Question": "\n
Automatic crop watering system
\n
Since 1990, Bertha Ascayo has been the manager of El Pallar, a farm in Chacra Province, where fruit trees are grown. In recent years, the climate has become more unpredictable, and the farm has suffered from periods of drought. Bertha is aware that she now needs to manage the watering of her fruit trees more than she has had to in the past.
\n
Bertha will need to make some improvements to the watering system by adding a rain sensor and use a computer program to automate the watering process. She has chosen a company that uses open-source software. The same company also installed the equipment for the watering of the trees.
\n
By using this software, Bertha can program a different watering plan for each type of tree. This includes programming the days of the week, times of the day, and length of the water cycle for each type of tree to be watered. For example, orange trees will be watered on Mondays and Thursdays at 6am for 45 minutes and at 8pm for 30 minutes.
\n
\n
Identify three characteristics of open-source software.
\n
[3]
\n
a.i.
\n
\n
A computer program uses data provided by a rain sensor to decide whether to water the trees. Identify three ways how the algorithm may be represented.
\n
[3]
\n
a.ii.
\n
\n
Water is becoming increasingly scarce in Chacra Province, and the provincial government is concerned there will be a point when there is not enough water for all of the farms to water their crops or fruit trees.
\n
To manage water for the watering of crops and fruit trees, the provincial government of Chacra Province intends to use computer modelling to calculate how much water each farm in the province will receive.
\n
Explain three factors that will contribute to the accuracy of this computer model.
\n
[6]
\n
b.
\n
\n
The farmers of Chacra Province are concerned about the provincial government using a computer model to determine the amount of water they will be allowed to use to water their fruit trees.
\n
To what extent should the farmers of Chacra Province rely on their knowledge and experience, rather than the computer-based solution provided by the provincial government, to manage the watering of the fruit trees?
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Anyone can edit and adapt it.
\n- It is community driven (i.e., people who use and adapt the software can support each other in developing the software).
\n- Open-source code can be viewed and adapted.
\n- It is license free, with free redistribution rights.
\n
\n
\n
Award [1] for identifying each characteristic of open-source software up to a maximum of [3] marks.
\n
a.i.
\n
\n
Answers may include:
\n
\n- Flow chart
\n- Pseudocode
\n- Natural language
\n- Structured language
\n
\n
\n
Award [1] for identifying each way the algorithm may be represented up to a maximum of [3] marks.
\n
a.ii.
\n
\n
Answers may include:
\n
\n- Quality of data input
\n- High-quality data will allow for a more accurate model to be developed, as this data will be more reliable / current water levels within each area must be accurate.
\n \n
\n
\n- Frequency of readings taken
\n- More frequent readings may be able to pick up more subtle changes in the patterns of rainfall to increase the accuracy of the model / taking daily readings and using them to create the model will be more accurate than using monthly readings.
\n \n
\n
\n- Number of variables taken into account when developing the model
\n- More variables will enable other, potentially less important, factors to be considered when developing the model / what crops are farmed in different areas in the province / the weather conditions in different areas of the province.
\n \n
\n
\n- Number of assumptions that have been built into the model
\n- If any of the assumptions are weak or false, the model will be inaccurate.
\n \n
\n
\n- Quantity of data input
\n- If the sample of data is larger, the resulting model will be more accurate / spans several years.
\n
\n
\n
Award [1] for identifying a factor that will contribute to the accuracy of the model and [1] for explanation why that will contribute to the accuracy of the model up to maximum of [2] marks.
\n
OR
\n
Award [1] for each example given and an additional [1] if the explanation contributes to the accuracy of the model up to a maximum of [2] marks.
\n
Mark as [2] + [2] + [2].
\n
b.
\n
\n
Answers may include:
\n
Knowledge and experience will:
\n
\n- allow the farmers to see more than water needs for a plant (sick leaves, buds falling, etc.) without needing to develop a model (judgement)
\n- be able to include other factors that may arise from time to time, such as quality of the water (e.g., coming with mud), and adjust their watering accordingly (judgement)
\n- be able to resolve potential issues that cannot be programmed into the computer or that would be outside the scope of a computational solution (intuition)
\n- provide expertise that cannot be quantified / ensure that in a worst-case scenario some of the farmers will be able to grow crops/trees (intuition).
\n
\n
Use of the provincial model will:
\n
\n- allow water to be distributed evenly between the farmers on a needs basis rather than based on the opinions of one or two stronger characters (equity)
\n- potentially have problems, as a scientific approach has limits (e.g., there may be variables that the model does not take into account) – accuracy, the decisions around the water requirements of the trees may be based as much on intuition as algorithms and models
\n- \npotentially have biased model/algorithms influenced by politics, e.g., farmers may not have fully disclosed their data / government may favour certain groups or industries.
\n
\n
Use of the computer system will:
\n
\n- reduce the amount of time farmers need to spend visibly checking their fields (automation)
\n- allow exact water usage to be measured and lead to potential efficiencies in its usage (accuracy)
\n- provide quantitative data that could be used as a model for other farmers growing the same trees in similar locations.
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: agriculture, ecosystems, algorithm, accuracy, reliability, model, modelling, judgement, automation, change, power, systems, ethics, values
\n
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "21M.1.SL.TZ0.1",
"topics": [
"topic-3-content",
"topic-2-concepts"
],
"subtopics": [
"3-1-data",
"2-1-change",
"3-5-media",
"3-2-algorithms"
]
},
{
"Question": "\n
Exoskeletons1 for workers
\n
Many jobs in modern manufacturing still require human workers, and many of these jobs involve lifting and carrying heavy loads. Some jobs require workers to maintain unnatural positions for a long period of time or hold tools for many hours. Workers doing these jobs are exposed to possible injuries, resulting in sick days or even a shortened work life. The Robo-Assist project is an attempt to address these problems (see Figure 2).
\n
Robo-Assist is a lightweight powered exoskeleton that uses motors and sensors to enable workers to bear only a small part of the weight of any load they are carrying.
\n
Robo-Assist has three supporting modules: one for the arms to help with lifting, one for the torso2 to support the back and spine, and one for the legs to support the inner thigh so lifting is easier.
\n
Figure 2: The Robo-Assist exoskeleton
\n
\n
A group of designers and engineers worked for three years to develop the prototype of the Robo-Assist arm module shown in Figure 3.
\n
Figure 3: Prototype of Robo-Assist arm module
\n
\n
In addition to preventing injuries, exoskeletons can use global positioning systems (GPS) to collect data about a worker’s location, vital signs, and neural signals, as well as other information relating to the user. Overall, Robo-Assist should make workers’ jobs easier and faster. The ultimate goal is to make Robo-Assist available for sale to industries for them to purchase for their workers.
\n
\n
1 exoskeletons: external wearable frameworks that strengthen a human’s natural physical ability
2 torso: the part of the human body that does not include the head, arms or legs
\n
\n
Identify two components of a global positioning system (GPS).
\n
[2]
\n
a.ii.
\n
\n
Identify two key stakeholders involved in this project.
\n
[2]
\n
a.iii.
\n
\n
The research team developing the Robo-Assist project used quantitative and qualitative data to gather information relating to the user.
\n
Explain why the research team collected quantitative and qualitative data.
\n
[6]
\n
b.
\n
\n
Other than for the prevention of injuries, discuss the impacts on workers and employers of the use of exoskeletons in the workplace.
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Satellites
\n- Receivers
\n- Ground stations
\n
\n
Award [1] mark for each component of a global positioning system (GPS) identified up to a maximum of [2] marks.
\n
a.ii.
\n
\n
Answers may include:
\n
\n- Manufacturer of the exoskeleton
\n- Workers
\n- Programmers
\n- Designers
\n- Employers (in the workplaces where Robo-Assist is used, i.e., the company purchasing the Robo-Assist)
\n
\n
Award [1] mark for each stakeholder identified up to a maximum of [2] marks.
\n
a.iii.
\n
\n
Answers may include:
\n
Quantitative data:
\n
\n- can be easily used for the statistical analysis/may be statistically significant\n
\n- is largely objective
\n- can be gathered relatively easier through surveys or questionnaires to show main trends/categorization/classify potential users
\n- does not require a skilled interviewer.
\n
\n
Qualitative data:
\n
\n- provides more nuanced information than quantitative data / the questionnaire may be too crude
\n- may provoke new areas for research (rather than being set by a survey)
\n- allows the research team to identify patterns in the data (inductive reasoning)
\n- may be able to elicit more sensitive/personal information.
\n
\n
Reasons for the collection of both types of data:
\n
\n- Collecting only quantitative data may not drill down deeply enough into the potential users of the Robo-Assist.
\n- Collecting only qualitative data may lead to a small sample size, as the amount of time to carry out interviews/observations/focus group discussions may be limited by the available time/budget for the research to be carried out.
\n- The two forms of data collected may complement each other and provide more usable information than either method on isolation.
\n- This collection method may fit with the requirements and/or skill sets of the research team.
\n
\n

\n
Keywords: quantitative, qualitative, classification, categorization, statistically significant, nuance, trends, patterns
\n
b.
\n
\n
Possible impacts include:
\n
\n- Employers might increase their expectations of workers, which could lead to more injuries, i.e., dehumanize workers (values, change).
\n- Workers might push themselves because the exoskeleton seems to make work easier, possibly resulting in injuries (values).
\n- Exoskeletons could collect data on the user, including private information.
\n- If a person is injured by someone wearing an exoskeleton, who is responsible/accountable? The manufacturer of the exoskeleton, the user, the company that purchased it?
\n- Older workers can stay in jobs longer.
\n- Productivity may improve.
\n- Will workers accept the technology? Is it legal? Does it meet regulations?
\n- Injured workers may be equipped with the exoskeleton and return to work earlier (values).
\n- It saves companies money/reduces sick time (values).
\n- Cost to employer of purchasing/maintaining exoskeleton.
\n- Cost to employer of training workers to use the exoskeleton.
\n- \nReliance on the technology: What happens if it breaks down? Can workers still do their work?
\n
\n
\n
N.B.: Some students may develop the impact of injuries on the workers or the companies. If they go beyond what is already stated in the question, this is an acceptable approach.
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: exoskeletons, health, business organization, regulations, responsibility, accountability, judgement, reliability, sensors, sensory inputs, data, change, systems, values
\n
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "18M.1.SL.TZ0.4",
"topics": [
"topic-4-contexts",
"topic-3-content",
"topic-2-concepts"
],
"subtopics": [
"4-3-environmental",
"3-1-data",
"2-1-change"
]
},
{
"Question": "\n
Technology disruption in Orams Academy
\n
Many schools use virtual learning environments (VLEs), such as Firefly, PowerSchool Learning, Schoology, Final Site LMS, and Google Classroom. The VLE is used for document storage, lesson content, and homework management as well as for communication between the school, students and parents.
\n
In addition to the VLE, collaborative cloud-based online tools, such as Google G Suite and Microsoft Office 365, are used by students and teachers.
\n
Recently, Daniela Stark, the principal at Orams Academy, has become concerned that using only one VLE may not prove to be as beneficial as originally thought. She has heard that some teachers and students are also successfully using social media tools, such as Facebook, Twitter and Instagram, to share their learning. She has also been told that the lack of bandwidth that the school experiences at times can cause problems.
\n
Daniela is considering an alternative approach, allowing teachers and students to choose the most appropriate tools to manage their learning.
\n
\n
Identify two characteristics of cloud-based storage.
\n
[2]
\n
a.i.
\n
\n
Identify two reasons why there might be a lack of bandwidth at times on the school’s network.
\n
[2]
\n
a.ii.
\n
\n
Identify two potential disadvantages of using online digital media.
\n
[2]
\n
a.iii.
\n
\n
The increasing use of cloud-based applications and online collaborative tools has led to Orams Academy introducing an acceptable use policy for students and teachers.
\n
Explain three reasons why Orams Academy decided to introduce an acceptable use policy.
\n
[6]
\n
b.
\n
\n
Discuss whether Daniela should make every teacher at Orams Academy use the same learning platform or allow each teacher to choose their own preferred learning management approach.
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Data is stored on remote servers accessed from the internet or cloud.
\n- Data can be accessed from anywhere as long as the person has an internet connection.
\n- Online space allows users to store data, photos, music, and videos.
\n- Documents stored in the cloud can be shared with others (most of the time) instead of sending them via emails.
\n- Cloud storage providers may provide other services, like backups.
\n- Requires a username and password for access.
\n
\n
\n
Award [1] for each characteristic of cloud-based storage identified up to [2] marks.
\n
a.i.
\n
\n
Answers may include:
\n
\n- Many students are using the internet (e.g., for social media) at certain times of the day (e.g., lunchtimes).
\n- A large number of classes are working simultaneously on collaborative projects (e.g., Google Docs).
\n- Due to geographic location, local ISPs may not be able to offer enough bandwidth, so at certain times there isn’t enough for all the users / shared bandwidth causes internet speeds to fluctuate.
\n- Technical issues at the ISP’s end may cause slow internet bandwidth supply to its clients for periods of time.
\n- Large videos are being streamed or downloaded to show in classrooms.
\n- Network design or infrastructure is not optimal / outdated equipment causes frequent outages.
\n
\n
\n
Award [1] for each reason identified up to [2] marks.
\n
a.ii.
\n
\n
Answers may include:
\n
\n- The media may be removed from the internet.
\n- The veracity of the digital media may be questionable.
\n- Internet is needed to view the media.
\n
\n
\n
Award [1] for identifying each disadvantage of using online digital media up to [2] marks.
\n
a.iii.
\n
\n
Answers may include:
\n
\n- To establish a philosophy of Orams Academy relating to the use of online environments…
\n- which acts as a guiding statement and provides the overarching principles for online behaviour (values).
\n
\n
\n- To establish a code of conduct (values)…
\n- that provides clear and unambiguous directions about how staff and students should act while online / using appropriate language in text chats / avoiding bullying behaviour / avoiding copying or plagiarism.
\n \n
\n
\n- To outline sanctions…
\n- that would be imposed if staff or students did not adhere to the code of conduct (values).
\n \n
\n
\n- To establish a disclaimer…
\n- so that Orams Academy is not responsible for the actions of the staff or students if an illegal activity is carried out / managers at Orams Academy are able to supervise everything that is posted onto the VLE / managers at Orams Academy would be able to read students’ messages (spaces).
\n \n
\n
\n- To establish data privacy and protection guidelines (security)…
\n- so it will be transparent who owns the data created in the VLE, for how long, and what type of data is collected by the VLE servers (systems).
\n
\n
\n
Award [1] for each reason given and an additional [1] for a development of this reason up to a maximum of [2] marks.
\n
Mark as [2] + [2] + [2].
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: cloud, policy, security, ubiquity, digital media, remote learning, change, spaces, systems, values
\n
b.
\n
\n
Answers may include:
\n
A single learning platform:
\n
\n- This means that all of the information is centralized and can be easily accessed by staff, students and parents (systems).
\n- The training requirements for staff are reduced, as they only have to use one system (systems).
\n- It prevents the use of a range of formats that may be incompatible, meaning that resources cannot be shared, or may need adapting to work on a different platform (systems).
\n- Having a common learning platform would make it convenient for the IT department to take backup/restore and roll over data to new academic year (systems).
\n- It makes it easier for senior managers to monitor the actions of staff, view lessons, etc., for consistency (values, power).
\n- Can be integrated into any acceptable use policy or training requirements (values).
\n- May be costly and based on proprietary software, meaning that fixes could be expensive and take a long time to happen (change).
\n- If the single platform is inaccessible for any reason, all learning content would be inaccessible (systems).
\n
\n
Teachers choosing their own preferred learning management approach:
\n
\n- allows teachers to use their expertise of particular tools
\n- allows teachers to feel they are being allowed to use their creativity and innovative approach to the teaching and learning (power)
\n- may integrate with social media tools that may be blocked by the school and provide a better user experience
\n- may provide better functionality than a “one size fits all” approach
\n- may lead to staff or students working outside an acceptable use policy / using the sites inappropriately
\n- the training requirements for staff will be increased if the staff are unfamiliar with the platforms / training will only occur on an ad hoc basis / training might be decreased since staff are already familiar with the tools they choose to use
\n- expertise of a platform may depend on particular teachers – if they leave, then no one may be able to support students with this tool (systems).
\n
\n
\n
Keywords: business, learning, education, training, judgement, platform, monitoring, acceptable use policy, interoperability, policy, change, systems, values
\n
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "21M.1.SL.TZ0.2",
"topics": [
"topic-3-content",
"topic-1-introduction",
"topic-2-concepts"
],
"subtopics": [
"3-4-networks-and-the-internet",
"1-1-what-is-digital-society",
"2-1-change"
]
},
{
"Question": "\n
Medical data shared in online apps
\n
Many people use smartwatches to monitor their vital signs and manage their health. Information such as heart rate, blood pressure and body temperature can be obtained from an app* like yourHealth on a smartwatch.
\n
Figure 1: The yourHealth app and smartwatch
\n

\n
Some users of the smartwatch app are concerned that their privacy might be invaded.
\n
\n
* app: an abbreviation for “application”, a specialized program run on mobile devices, a computer, or other electronic device
\n
\n
The uniform resource locator (URL) for the smartwatch app in Figure 1 is https://www.yourhealthwatch.com/2020/03/export-data-yourhealth-watch-health-app.html.
\n
\n
Define the term privacy.
\n
[2]
\n
a.i.
\n
\n
Identify two ways the smartwatch and cellphone (mobile phone) could use to communicate with each other.
\n
[2]
\n
a.ii.
\n
\n
Outline one reason why protocols such as https are used in the URL to enable digital devices such as the smartwatch and cellphone to communicate with each other.
\n
[2]
\n
a.iii.
\n
\n
Explain why end-users should be involved in the development of software products such as the smartwatch app.
\n
[3]
\n
b.i.
\n
\n
Explain why the developers of software products such as the smartwatch app have an ethical obligation to potential users.
\n
[3]
\n
b.ii.
\n
\n
Many people use smartwatches to monitor their vital signs and manage their health.
\n
To what extent should an individual use a smartwatch to manage their health?
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- knowing who somebody is
\n- … but not knowing what activities they are carrying out.
\n \n- having control over one’s personal information
\n- … such as the ability of individuals/groups to determine when, how and to what extent their personal information is shared with others (Guide p.21).
\n
\n
\n
Award [1] for identifying privacy and [1] for an additional comment.
\n
a.i.
\n
\n
Answers may include:
\n
\n- Bluetooth.
\n- WiFi
\n- Near field communication (NFC).
\n
\n
\n
Award [1] for identifying each way that the smartwatch and the cellphone could use to communicate with each other up to [2].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- Protocols are a set of rules
\n- … that provide an agreed framework/convention that enables devices to communicate with each other / that specify how information will be transferred using the URL.
\n
\n
\n
Award [1] for identifying a reason why protocols such as https are used in the URL to enable digital devices such as the smartwatch and cellphone to communicate with each other and [1] for a development of that reason up to [2].
\n
a.iii.
\n
\n
Answers may include:
\n
\n- End-users are able to provide an insight into how a product may function
\n- … which may not be possible to obtain from in-house testing (alpha testing)
\n- … as this may not expose the product to the range of situations it may be expected to function in
\n \n- End-users are able to provide an insight into how a product may function
\n- … and this could be considered to be beta testing
\n- … this may make end-product more marketable / desirable to the end-user.
\n \n- End-user testing can take place in the customer's environment.
\n- … allowing them to use the program under normal conditions
\n- … which may allow them to find “bugs” / features that need improving / discover new features and suggest these to the developers / which may lead to making the end-users more likely to use the finished product as they are involved in its development.
\n
\n
\n
Award [1] for identifying a reason why end-users should be involved in the development of products such as the smartwatch app and [1] for each subsequent development of that reason up to [3].
\n
b.i.
\n
\n
Answers may include:
\n
\n- Acting ethically means not causing harm.
\n- … this may mean that certain features of the product will not be developed
\n- … such as those that will have a negative physical or psychological impact, such as a tendency to become addicted to the device / notifications are left on as default settings / information is not shared with third parties without the consent of the user.
\n
\n
\n
Award [1] for identifying a reason why the developers of software products such as the smartwatch app have an ethical obligation to the potential users and [1] for each subsequent development of that reason up to [3].
\n
b.ii.
\n
\n
Answers may include:
\n
Advantages:
\n
\n- Patients will be able to keep abreast of their vital signs / medical condition 24/7 (systems).
\n- This can lead to them having less need to go to the doctors or to use valuable health resources if the condition is not serious (environment).
\n- All the historical data may be captured (systems, ethics).
\n- The data will be more comprehensive than if it is only collected in a consultation with a doctor.
\n- Which may mean it is easier to discover/model trends / abnormalities.
\n- Might allow users to better manage illnesses which can be controlled, like diabetes and high blood pressure (values/ethics).
\n- Allows users to maintain a healthy lifestyle as their vital signs can show the benefits of healthy activity e.g., exercise, good sleep, eating well etc. (values).
\n
\n
Disadvantages:
\n
\n- The app might suggest treatments which are not appropriate if the user’s symptoms do not match the ‘average’ symptoms for a particular condition (data, systems).
\n- Users of the smartwatch may become fixated by it, which could have negative effects such as white coat syndrome (values/ethics).
\n- May be unreliable - may be lost or damaged or experience software bugs which make them unreliable (systems).
\n- Technology in a smartwatch may not provide accurate enough readings for medical use (systems).
\n- The user may not want to use the watch because they are worried about what might happen to the data which the watch generates i.e. could be sold to or shared with third parties / used against them by insurance companies or potential employers etc. (values/ethics).
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: health, well-being, algorithm, accuracy, reliability, data, model, modelling, judgement, automation, change, power, systems, ethics, values
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "22M.1.SL.TZ0.1",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-1-data",
"3-4-networks-and-the-internet",
"3-2-algorithms"
]
},
{
"Question": "\n
Social robots
\n
When many people think of robots, they think of them in large-scale industrial settings, such as manufacturing automobiles (cars), but this is not always the case. Figure 2 shows an image of Robbi, the first social robot for the home. Robbi can be purchased for US$699.
\n
Figure 2: Robbi
\n

\n
Robbi is connected to the Internet of Things (IoT). The IoT is “the network of physical objects – or ‘things’ – embedded with electronics, software, sensors and network connectivity, which enables these objects to collect and exchange data”1.
\n
Robbi is able to carry out simple tasks, such as reminding someone when they have an important meeting, or turning the heating or air conditioning on or off in a person’s house while they are away.
\n
\n
\n
1 Wikipedia, “Internet of things” (https://en.wikipedia.org/wiki/Internet_of_things)
\n
\n
Identify two sensors that Robbi could use.
\n
[2]
\n
a.i.
\n
\n
Identify the steps Robbi would take in order to turn the air conditioning on and off.
\n
[4]
\n
a.ii.
\n
\n
It has been decided to provide only online access to documentation for Robbi. There will be no downloadable PDFs.
\n
Analyse this decision.
\n
[6]
\n
b.
\n
\n
Robbi’s website claims that, “Robbi is friendly, helpful and intelligent. He can sense and respond, and learns as you engage with him”. Some of the customers who own Robbi are considering whether they could extend the range of tasks Robbi could perform, or whether they should allow Robbi to make decisions for them.
\n
To what extent should individuals rely on social robots like Robbi to act as decision-makers for them?
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Obstacle sensor
\n- Temperature sensor / heat sensor
\n- Light sensor
\n- Proximity sensor
\n- Humidity sensor
\n- Sound sensor
\n
\n
Award [1] for identifying each sensor that Robbi could use up to a maximum of [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- Detect the room temperature / senses the change in temperature.
\n- Compare the temperature to a pre-set value.
\n- If the temperature detected is more than the pre-set value, switch on the AC.
\n- If the temperature detected is less than the pre-set value, switch off the AC.
\n- Robbi collects data from temperature sensors at a set interval, and when a room reaches a desired temperature, Robbi lowers the intensity or turns the AC off.
\n- If the owners have set a time for the AC to be turned off, Robbi sends a signal for all the AC units to be turned off.
\n
\n
Award [1] for identifying each step Robbi would take in order to turn on and off the air conditioning up to a maximum of [4].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- Only producing online data may mean that there is only one master copy of the information, which means that it will be more straightforward to update the information than if it is stored in more than one place (systems).
\n- Having information in more than one place may lead to issues, such as version control, and staff may find that even relatively minor amendments require a significant amount of staff time and cost (systems).
\n- The rapid rate of evolution of Robbi may mean that by the time the PDFs are produced, the next iteration will be released, making their production surplus to requirements (change).
\n- The design of the website will be critical to the updating of the content. A poorly designed website may not be appropriate for using this method of updating documentation (systems).
\n- Many users will prefer to have PDF documentation that they can download and use when they are not connected to the internet. Online documentation will require that the user is connected to the internet and may be less convenient to use (systems).
\n- Using PDFs may require a well-organized library system where the previous versions of the PDF are stored, whereas meta-data trails may be used to show when the website is updated (systems).
\n- Some functions of Robbi work without access to the internet (using the local network), so if the internet goes down, there is no access to the documentation (access, systems).
\n
\n
\n

\n
Keywords: skills, connectivity, access, change, systems
\n
b.
\n
\n
Answers may include:
\n
Reasons why individuals could rely on robots such as Robbi to act as decision-makers for them: ·
\n
\n- Customers can log into Robbi from their internet or their mobile phone, which will give them a feeling of security that they have control over events/activities that are occurring remotely (systems).
\n- With greater decision-making capabilities, Robbi can free up individuals so they can concentrate on less mundane activities (automation, systems).
\n- Robbi is reflecting on the development of society as a whole. If the delegation of decision-making to robots such as Robbi is more common, this should not be an issue (values).
\n
\n
Reasons why individuals should not rely on robots such as Robbi to act as decision-makers for them:
\n
\n- Robbi may not be connected at all times, for example in power outages or a router failure (systems).
\n- Robbi does not have human intuition, so customers could find Robbi is making decisions that are not appropriate for the situation.
\n- If Robbi makes a bad decision, there may legal issues that may arise should there be a problem/accident, etc. (accountability, transparency, power).
\n- Robbi could eventually reduce the decision-making capabilities of the customer (autonomy).
\n- Robbi may not be seen as neutral by customers, and if used to supervise others, Robbi could be seen as a method of surveillance.
\n- The data that is associated with Robbi may be highly sensitive, and there may be concerns about its security if it is easily accessible.
\n- Decision-making can take place at a number of levels. Robbi may be appropriate for some tasks, but not for others. Customers must use their judgement when determining what constitutes an appropriate task for Robbi.
\n- Robbi may make decisions that may not be considered to be ethical (values).
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: automation, connectivity, social robots, change, power, systems, values, ethics, accountability, transparency, autonomy, decision-making, judgement
\n
\n
Refer to SL/ HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "17N.1.SL.TZ0.4",
"topics": [
"topic-3-content",
"topic-4-contexts",
"topic-5-hl-extension"
],
"subtopics": [
"3-3-computers",
"3-2-algorithms",
"4-5-human-knowledge",
"5-1-global-well-being"
]
},
{
"Question": "\n
App or intuition?
\n
Apps have been developed that allow a customer to submit a trip request to a taxi company on their smartphone. These apps allow the customer to select the starting point and final destination of the journey as well as add other information, such as the time of journey and number of passengers.
\n
The developers of the taxi journey app claim it can capture the real-time details of a journey, including the starting point, route, distance travelled, the speed of the car and the final destination. The app integrates this information with real-time traffic information, such as closed roads or accidents. Fares can be estimated before the journey, and the customer can pay digitally with their credit card or by PayPal.
\n
Some traditional taxi drivers in cities such as Paris and Rio de Janeiro have campaigned against the introduction of these apps in taxi companies. Based on previous journeys recorded by the app, the taxi company recommends that their taxi drivers rely on the taxi journey app rather than their own knowledge of the city when determining the best route.
\n
Discuss whether the taxi driver should rely on the taxi journey app, rather than their own knowledge of the city, when determining the best route.
\n
",
"Markscheme": "\n
Answers may include:
\n
Rely on the taxi journey app (claim)
\n
\n- It will speed up the process of drivers being able to learn the routes (automation), meaning they are able to provide a better service to customers more quickly.
\n- The app will give consistency in the routes used, so the passengers should be confident that the route being selected is the most appropriate (trust, transparency).
\n- If the decisions of the route in the app are collected, the results may be analysed and the reliability evaluated/increased. It may make it possible to monitor the drivers more closely.
\n- The app may be updated in real time, so the driver may not need to check on changes such as roads being closed or reopening (change).
\n- The app may result in shorter distances being travelled and cost savings for the taxi company (cost).
\n- The driver may not have sufficient knowledge of these areas to be able to determine an effective route.
\n
\n
Rely on driver’s knowledge and intuition (counter-claim)
\n
\n- They may use their professional judgement / intuition that has been gained by doing the job for a number of years.
\n- The system may not be able to determine certain routes, such as those that go outside of the central part of the city. This may mean the usability / effectiveness / reliability of the app is reduced.
\n- There may be new requirements that have not been incorporated into the system (change) that may mean it is not providing the most up-to-date information (cost).
\n- The route-finding algorithms that exist within the digital system may have inherent/subconscious biases (power, values, ethics). For example, they may route the driver past certain locations, or avoid others.
\n- There may be parts of the city where the connection cannot be maintained, such as where there are very tall buildings surrounding the road. This may lead to the app not performing as expected (reliability, feasibility).
\n- The taxi driver may feel that they are being surveilled (power, values, ethics).
\n- Would the installation of the app be a requirement for the job (systems, ethics, values)?
\n
\n
\n
In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: change, power, systems, values, ethics, apps, security, privacy, algorithms, transparency, reliability, surveillance, cost, feasibility
\n
\n
Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "18N.1.HL.TZ0.5",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-1-data"
]
},
{
"Question": "\n
Selecting candidates for political parties
\n
Political parties often have large numbers of applicants who wish to act as representatives in their various governing bodies. A senior party official must make the final decision about which applicants should be offered which roles. Many roles receive as many as 15 applications, and it is not possible to interview each applicant.
\n
In an attempt to streamline the application process, a prospective representative will need to complete two tasks:
\n
\n- Completing an online questionnaire.
\n- Submitting a video where they explain the reasons behind their application.
\n
\n
Neither task will involve the team in the political party.
\n
The applicants will be directed to a link provided by the software developer where they can complete both tasks. The responses to the questionnaires and the videos will be analysed using artificial intelligence (AI).
\n
The software will score the questionnaire and video for each applicant and send it to the senior party official’s team. The applicants with the highest scores will then be invited by the political party for an interview.
\n
The software developers claim this will reduce the number of applications the senior party official needs to process and lead to the most appropriate applicants being selected for an interview.
\n
Discuss whether the political party should introduce the digital system to assist the senior party official when deciding which applicants should be offered roles as representatives.
\n
",
"Markscheme": "\n
Answers may include:
\n
Introduce the digital system (claim):
\n
\n- Will speed up the process and ensure that candidates who are most unlikely to be suitable can be removed, allowing time to be spent on the candidates who are likely to be suitable to act as a representative (automation, cost).
\n- The digital system may provide consistent outcomes, so the candidates whose application is rejected cannot claim there was an inherent bias in the values of the selection team making the decisions (values, ethics).
\n- If a large number of decisions are programmed into the digital system, it should give reliable results.
\n- If the digital system has machine learning capabilities, the algorithms in the digital system may be able to group similar candidates (cluster analysis / unsupervised analysis) (innovation).
\n
\n
Not introduce the digital system (counter-claim):
\n
\n- The selection team know additional information that can have an impact on their decision, and this will require their professional judgement / intuition.
\n- The selection team may find that there are candidates that apply for the position of representative that cannot be evaluated by the system, which limits its usability / effectiveness / reliability / feasibility.
\n- There may be new requirements that have not been incorporated into the system (change).
\n- The algorithms that exist within the digital system may have inherent/subconscious biases (power, ethics, values).
\n
\n
\n
In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: change, power, systems, ethics, values, judgement, intuition, bias, algorithm, transparency, reliability, automation, cost, innovation
\n
\n
Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "18N.1.HL.TZ0.6",
"topics": [
"topic-2-concepts"
],
"subtopics": [
"2-1-change"
]
},
{
"Question": "\n
Can digital technologies be used sustainably?
\n
Many organizations claim that the most efficient use of information technology (IT) equipment, such as laptops and printers, is to replace them on a regular basis. For example, an organization’s strategy may be to do this every three years.
\n
Other organizations purchase IT equipment that can easily be upgraded by increasing the storage and memory or upgrading the processing capabilities only when required. They claim they do not need to replace their IT equipment on such a regular basis and believe this is a more sustainable practice.
\n
Evaluate the sustainability of these two strategies.
\n
",
"Markscheme": "\n
Answers may include:
\n
Replacing IT equipment on a regular basis: (claim)
\n
\n- Potentially less disruptive as change at an organizational level only occurs for a relatively short period of time (feasibility).
\n- Less disruptive for the employee, as the laptop/printer a direct changeover.
\n- All employees are likely to use the same IT equipment, so easier to support (equity).
\n- The legacy equipment may be disposed of (reconditioned) as a batch and the process will be managed better/more sustainable than an ad hoc approach that may be used if the equipment is upgraded on demand.
\n- This may be more effective than using higher specification IT equipment than necessary as the advances in technology (Moore’s Law) may require the upgrade process to be an almost continual cycle.
\n
\n
Increasing the specification of the IT equipment: (counter-claim)
\n
\n- Potentially less disruptive/less change, especially if the organization changes the manufacturer of the IT equipment, which would require employees to “learn” how to use it.
\n- The upgrade of the IT equipment will be more focused and may be carried out only as and when required – more sustainable / feasible.
\n- It requires the least use of “new” IT equipment.
\n- It may involve the fewest changes to the IT systems.
\n
\n
Conclusions:
\n
The strategy chosen can be justified as:
\n
\n- being the most sustainable/green strategy, and this would be in keeping with the organization’s values\n
\n- requiring the least change/cost for the organization
\n- the most acceptable solution.
\n
\n
\n
In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: responsible consumption, waste prevention, green computing, e-waste, planned obsolescence, economic, pollution, waste, Moore’s Law, CPU, central processing unit, memory, systems, change, values, equity, feasibility
\n
\n
Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "18M.1.HL.TZ0.5",
"topics": [
"topic-2-concepts"
],
"subtopics": [
"2-1-change"
]
},
{
"Question": "\n
Policing as a human activity?
\n
Toby Walsh, Professor of Artificial Intelligence at the University of New South Wales, Australia, notes that the use of police robots raises “many important questions that we, as a society, have to think about”.
\n
Singapore has started testing patrol robots that survey pedestrian areas in the city-state. Xavier, the mall-cop robot, will be autonomously rolling through the Toa Payoh central district for three weeks scanning for “undesirable social behaviours”.
\n
Figure 4 shows an example of a patrol robot.
\n
Figure 4: An example of a patrol robot
\n

\n
[Image by Jdietsch. PatrolBot.jpg (https://commons.wikimedia.org/wiki/File:PatrolBot.jpg).
Under copyright and licensed under a Creative Commons Attribution 3.0 International License,
https://creativecommons.org/licenses/by-sa/3.0/deed.en (image cropped)]
\n
It has been claimed that the use of patrol robots will lead to more efficient policing.
\n
Discuss the extent to which police departments should use patrol robots as a strategy to aid policing.
\n
",
"Markscheme": "\n
Answers may include:
\n
Benefits of robots: (claim)
\n
\n- Patrol robots can save lives (can defuse bombs, can be sent into other situations that would be dangerous for humans).
\n- Under pressure, human beings can make mistakes that patrol robots would not make.
\n- A robot’s sensors may be able to detect things that a human could not (such as smelling gases, facial recognition, etc.).
\n- Emotions will not affect the decisions/behaviour of the robot/decision-making will be consistent.
\n
\n
Problems with robots: (counter-claim)
\n
\n- How do we keep patrol robots from being hacked, i.e., taken over by third parties?
\n- Will police departments be tempted to weaponize their patrol robots in order to minimize the risk to officers (ethics, values)?
\n- Will communities accept their use? Will they feel surveilled (ethics)?
\n- Humans can be held responsible / accountable for their actions while there is doubt about who to blame with a patrol robot.
\n- Humans can use intuition/experience/judgement to detect aspects of a situation that a patrol robot cannot.
\n- People may feel safer with human officers than with patrol robots.
\n- Can the patrol robots communicate with police officers in real time (networks, bandwidth, systems, feasibility)?
\n- Loss of human jobs as a result of automation.
\n
\n
Decision-making and guidelines that determine the extent to which robots can be used in policing:
\n
\n- Who should decide how they are used?
\n- What kinds of patrol robots should be available to police?
\n- What are the guidelines/regulations for remotely killing a human being? Are they transparent?
\n- How should police who use patrol robots be trained?
\n- Who is accountable for the outcomes?
\n- Who will determine the balance of power between humans and patrol robots (values)?
\n
\n
\n
In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: crime, law, regulation, accountability, responsibility, acceptance, transparency, privacy, anonymity, intuition, judgement, surveillance, networks, bandwidth, robots, automation, decision-making, change, power, systems, ethics, values, feasibility
\n
\n
Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "18M.1.HL.TZ0.6",
"topics": [
"topic-5-hl-extension"
],
"subtopics": [
"5-1-global-well-being"
]
},
{
"Question": "\n
Google health care data
\n
Google is developing an app to assist hospitals in monitoring kidney disease in patients. To develop this app, Google has signed an agreement with the UK’s National Health Service (NHS) that will give Google access to data on over one and a half million patients held in the NHS database.
\n
The database includes health-related data as well as personal data, some of which is sensitive.
\n
Google plans to use data analytics techniques and artificial neural networks (ANNs) to analyse the data and provide information that can be used to improve the app. Once the app has been developed, it will be provided to the NHS.
\n
\n
Identify two items of health-related data that could be used to improve the treatment of patients.
\n
[2]
\n
a.i.
\n
\n
Identify two reasons why organizations like the NHS would use data analytics.
\n
[2]
\n
a.ii.
\n
\n
Identify two reasons why NHS records are stored in a database rather than in a spreadsheet.
\n
[2]
\n
a.iii.
\n
\n
The agreement between Google and the NHS includes policies for the collection, storage and sharing of patient data.
\n
Explain why it is important that the agreement between Google and the NHS includes policies for the collection, storage and sharing of patient data.
\n
[6]
\n
b.
\n
\n
Evaluate the decision by the NHS to share patient data with Google.
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Age
\n- Weight
\n- Heartbeat pattern
\n- Blood pressure
\n- Blood type
\n- Breathing rate
\n- Blood oxygen concentration
\n- Body temperature
\n- Allergies
\n- Pre-existing medical conditions
\n- Sex
\n
\n
Award [1] for identifying each item of health-related data that could be used to improve the treatment of patients up to a maximum of [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- To determine data trends and patterns (in large data sets).
\n- To provide information to organizations like health providers for future strategic decisions.
\n
\n
Award [1] for identifying each reason why organizations such as the NHS would use up to maximum of [2].
\n
a.ii.
\n
\n
Answers may include:
\n
Reasons to not use spreadsheets:
\n
\n- Spreadsheets cannot accommodate very large data sets / only have 105 000 rows.
\n- Spreadsheets are designed to perform calculations.
\n- Spreadsheets do everything in memory, so any unsaved data can be lost if the system crashes.
\n
\n
Reasons to use a database:
\n
\n- Databases generally have more intuitive user interfaces.
\n- Complex queries can be set up and applied to the data set.
\n- Reports can be generated.
\n- A DBMS (database management system) usually has security features to keep the data safe.
\n- Data is written to disc immediately.
\n- Related data tables can be linked.
\n- Databases reduce data redundancy.
\n
\n
\n
Award [1] for identifying each reason why NHS records are stored in a database rather than a spreadsheet up to maximum of [2].
\n
a.iii.
\n
\n
Answers may include:
\n
A policy is required for collection:
\n
\n- so that only the relevant information is collected (with such a large data set, large amounts of data could be collected, much of which are not relevant)
\n- so that it is made clear to the data subjects/patients the purpose of collecting the data is / what data will be collected
\n- so that it is clear who is responsible for collecting the data
\n- so that it is clear how the data will be collected
\n- to ensure that only the information of patients who have consented to the use of their data is collected or that they have a way to opt out of their data being used
\n- so that the accuracy of the data collection can be ensured
\n- to ensure that the data is collected consistently.
\n
\n
A policy is required for storage:
\n
\n- to ensure that data is stored securely
\n- to make it clear who is responsible for the security of data storage
\n- to make it clear who should be accountable for the security of the data
\n- to make it clear where the data is stored (it is likely that most of it is confidential)
\n- to make it clear who has access to the data
\n- to ensure that data is stored in an accessible manner for authorized users
\n- to make it clear that data storage will comply with the law
\n- to make it clear how the data will be stored
\n- to make it clear how long the data can be stored.
\n
\n
A policy is required for sharing:
\n
\n- so that it is clearly identified with whom the data will be shared
\n- to make it clear how the data will be shared (will they be safe during the transmission?)
\n- to make it clear what happens to the data once it is shared
\n- to make it clear for what purpose the data will be shared (it is likely that a large part of the data linked to patients is confidential).
\n
\n
\n
N.B.: The response requires an explanation of why a policy is required rather than discussion of what is included in the policy. There must be an explanation for why each policy is required.
\n
Award [1] for identifying why a policy for the collection, storage and sharing of patient data is required and [1] for a development of the explanation up to a maximum of [2].
\n
Mark as [2] + [2] + [2].
\n
b.
\n
\n
Answers may include:
\n
Reasons for sharing the patient data with Google:
\n
\n- \nGoogle may have access to data analytics tools that can interrogate the data far more effectively than the NHS data analytics systems.
\n- \nGoogle may provide additional IT expertise that the NHS can use.
\n- \nGoogle may be able to provide additional health-related data/information.
\n- \nGoogle may be able to integrate this NHS data with existing applications, such as Google Maps, to provide meaningful visual data / Google may provide additional resources such as data visualization tools (systems).
\n- Data can be analysed against other data sets.
\n
\n
Reasons for not sharing the patient data with Google:
\n
\n- There may be no way of knowing which other third parties Google is sharing the NHS information with (security, values).
\n- The NHS may find that the patient data becomes integrated onto Google’s tools so that they cannot extricate themselves from the contract (power, values).
\n- The NHS may find as part of the agreement that Google imposes conditions that may mean the data is not used in an optimal manner, or not used for the purposes it was intended (values).
\n- Once the data is shared, it is hard to guarantee that is deleted when it is no longer needed.
\n- Patient privacy is a concern. Is data anonymized and does Google have sufficient security measures in place (values)?
\n- Rejection of patients’ consent to share their data with Google (values).
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: health, data, patient, analytics, privacy, anonymity, security, change, power, systems, values, ethics
\n
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document
\n
c.
\n
",
"Examiners report": "",
"question_id": "18N.1.SL.TZ0.1",
"topics": [
"topic-3-content",
"topic-2-concepts"
],
"subtopics": [
"3-1-data",
"2-1-change"
]
},
{
"Question": "\n
Cell phone farmers
\n
Many farmers in Cameroon are not able to use the internet due to the very limited communication infrastructure in the country. In addition, accessing the internet is expensive for most farmers.
\n
As many farmers have cell/mobile phones, they could make better use of technologies such as text messaging (SMS*) to access information that would assist them in their farming.
\n
However, recent research has suggested that a lack of internet access is not the main factor limiting the development of farming in Cameroon: the main factor is farmers’ lack of IT knowledge.
\n
Some farmers in Cameroon are trialling a system called Agritexte, which uses text messages to provide information on the market prices of produce, such as cassava leaves and cocoa (see Figure 1).
\n
Figure 1: An example of a text message
\n

\n
\n
* SMS: short message service
\n
\n
Identify two advantages of using text messaging to communicate.
\n
[2]
\n
a.i.
\n
\n
Identify two items that contribute to the cost of accessing the internet.
\n
[2]
\n
a.ii.
\n
\n
Outline the difference between the internet and the World Wide Web.
\n
[2]
\n
a.iii.
\n
\n
Analyse the effectiveness of using face-to-face (F2F) training compared to distance learning to train farmers to use Agritexte.
\n
[6]
\n
b.
\n
\n
The government of Cameroon is watching the results of the Agritexte initiative. It is considering two options:
\n
\n- extending the functionality of Agritexte into a web-based information system
\n- investing in education and training on the use of the existing Agritexte SMS system.
\n
\n
Evaluate these two options.
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Easy to use
\n- Not dependent on internet access
\n- Cheap
\n- Can be done from very old hardware
\n- Messages get sent when there is reception even if they are written when there is no reception
\n- Quick communication
\n- Messages get stored in the device
\n- Allows the communication with people that are a long distance away
\n
\n
Award [1] for identifying each advantage of using text messaging up to a maximum of [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- Subscription to ISP / cost of data bundles
\n- Cost of hardware
\n- Line rental
\n- Cost of electricity
\n- The cost of education to learn how to use equipment
\n
\n
\n
Do not accept costs related to the limited infrastructure.
\n
Award [1] for identifying each item that contributes to the cost of internet access up to maximum of [2].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- The internet is a global network of interconnected computers / a network of networks.
\n- The World Wide Web is software / a service that runs on the hardware of the internet and provides access to content / a collection of pages that can be accessed through hyperlinks / a way of accessing and sharing the information that is held on the internet in web pages.
\n- The World Wide Web uses the http protocol. This is only one of the many protocols used by the internet.
\n
\n
\n
The response must make reference to both the internet and the World Wide Web. Do not award marks if only one is mentioned.
\n
Award [1] for identifying each difference up to maximum of [2].
\n
a.iii.
\n
\n
Answers may include:
\n
Advantages of F2F training:
\n
\n- The workshop leader/teacher can adapt their teaching to the needs of the students.
\n- Specific questions can be addressed in the moment.
\n- The teacher can observe participants using the technology first-hand to assess their progress.
\n- It is easier for farmers to concentrate if they have a block of time away from farm duties.
\n- Access to the internet is not required.
\n
\n
Disadvantages of F2F training:
\n
\n- It is costly to send a person to run the training or to send farmers to a workshop.
\n- Classes might be large, so students will not get much personal tutoring from the teacher.
\n- If a student misses something, the teacher says they might get lost and have misunderstandings.
\n- If a student is unable to attend a session, they will miss out on that information and training.
\n- There could be personality clashes between the teacher and their students.
\n- It could be difficult to fit training around farmers’ work schedules.
\n
\n
Advantages of distance learning:
\n
\n- It can be accessed 24/7 – farmers can still run their farms.
\n- Learning can be self-paced.
\n- Teaching material can be viewed as many times as students need in order to be able to understand it.
\n- It is easier to spread the training over several weeks, allowing farmers to try the technology in between classes.
\n- It would be cheaper than running workshops.
\n
\n
Disadvantages of distance learning:
\n
\n- Some technology would be required by farmers to access the training materials.
\n- Farmers will need to be trained to use the training technology.
\n- If students don’t understand something in the training materials, it is harder for them to ask for further explanation.
\n- There would be significant set-up costs.
\n- Access to the internet is necessary. An unstable connection to the internet may affect the quality of the learning, as it may cause frustration among the farmers.
\n
\n
\n

\n
b.
\n
\n
Answers may include:
\n
Extending the functionality of Agritexte:
\n
\n- Many more services can be offered (systems).
\n- This would be an investment in the future, giving farmers the potential to access developing/new technologies (systems).
\n- The current system can still continue to operate as it has been doing, and the new functionality will only add to the system (systems).
\n- The extension into a web-based information system could inspire citizens to educate themselves (skills).
\n- The extension into a web-based information system could inspire citizens to explore other things that they can do on the web (skills).
\n- Farmers’ lack of IT knowledge is already a problem, so they may have difficulty using the web-based system, and training will be required (access).
\n
\n
Investing in education and training:
\n
\n- Training would allow more people to access the information that currently exists (skills).
\n- Training would extend people’s skill sets and they could use those skills to improve their lives (skills).
\n- It would be a very visible investment from the government (values).
\n- Education would improve the community connections (skills, systems).
\n- The money would be spent training farmers to use a technology with limited functionality (skills).
\n- Lack of internet availability might limit farmers’ ability to access the system (systems).
\n- Development and maintenance of the system would incur costs (systems).
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: education, training, agriculture, infrastructure, text, web, skills, change, systems, values, ethics
\n
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "18N.1.SL.TZ0.2",
"topics": [
"topic-3-content",
"topic-1-introduction",
"topic-2-concepts"
],
"subtopics": [
"3-5-media",
"1-1-what-is-digital-society",
"3-4-networks-and-the-internet",
"2-1-change"
]
},
{
"Question": "\n
Online learning
\n
TailorEd is a free online learning system that personalizes students’ learning by providing teachers with data about how students are progressing in their courses. Students create a personal profile and work through the assignments at their own pace. Teachers can log in to the learning system to see how the students are progressing. However, concerns have been expressed about the amount of data that is being collected.
\n
The school has found that when students access the course platform, some content is being blocked. The network administrator has been asked to investigate the situation. Teachers believe that it would be more appropriate to train the students to use the platform responsibly, rather than use technology to block their access to certain websites.
\n
\n
Identify two ways how the TailorEd system could provide feedback to students.
\n
[2]
\n
a.i.
\n
\n
Identify two ways how the data collected about students’ academic progress could be used by TailorEd.
\n
[2]
\n
a.ii.
\n
\n
Outline how a firewall functions.
\n
[2]
\n
a.iii.
\n
\n
There are two possible methods for ensuring students use the TailorEd online learning system responsibly. They are:
\n
\n- restricting access to sites that may be considered inappropriate
\n- educating the students about acceptable use.
\n
\n
Analyse these two methods.
\n
[6]
\n
b.
\n
\n
To what extent do the benefits of collecting students’ academic progress data outweigh the concerns of the students, teachers and parents?
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Graphics/text on the screen
\n- Sent by email to the student
\n- Haptic feedback on correct answers in a mobile version
\n- Notifications in a mobile app
\n- By awarding badges
\n- Chat/chatbot
\n
\n
\n
Award [1] for identifying each way the TailorEd system could provide feedback to students up to maximum of [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- To send students advertisements of relevant educational material
\n- To ascertain the effectiveness of the lessons
\n- To adapt the tasks to the students’ abilities
\n- To offer tutoring if students fail a particular unit
\n- To share with universities and aid candidate selection
\n- To give opportunities to high scoring students
\n- To keep parents informed
\n
\n
\n
Award [1] for identifying each way the data collected about students’ academic progress could be used by TailorEd up to maximum of [2].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- Monitors incoming and outgoing traffic.
\n- Acts like a filter between the computer and the internet.
\n- Blocks specific ports / IP addresses / protocols / words or phrases.
\n- Either allows traffic to pass through the firewall or not based on a set of predetermined rules.
\n
\n
\n
Award [1] for identifying the basic function of a firewall and [1] for a development of the initial idea up to maximum of [2].
\n
a.iii.
\n
\n
Answers may include:
\n
Reasons for restricting access to sites that may be considered inappropriate:
\n
\n- To stop students going to websites they shouldn’t (power).
\n- To ensure the school’s bandwidth is used for education rather than for other purposes (systems).
\n- To protect students from dangers on the web / some inappropriate sites appear without warning and they are hard to avoid (values).
\n- Parents may be happier knowing the filtering technology is in place as it will restrict access for younger students who cannot filter for themselves (systems).
\n
\n
Reasons for educating students about acceptable use:
\n
\n- The students learn to take responsibility for their actions, as this will be a skill they will need outside school (values).
\n- Students will always find ways to circumvent the filters applied by the school (systems).
\n- Who decides what will be blocked? Learning may be constricted by the use of a white list (power).
\n
\n
\n

\n
Keywords: education, training, relationships, trust, wisdom, judgement, expression, identity, power, systems, ethics, values
\n
b.
\n
\n
Answers may include:
\n
Benefits of collecting students’ progress data:
\n
\n- The data collected can be tailored to provide more individualized learning for the student.
\n- \nAutomation may allow the student’s progress to be reported back to the teacher/parent on a more regular basis and in a more standardized format.
\n- The school is able to use the data to identify trends and patterns that may not be immediately obvious and use this data-driven approach to improve the performance of its teachers and students.
\n- This information can be used by the students when applying for jobs or even for further education.
\n
\n
Concerns of the students, teachers and parents:
\n
\n- They may not know what data is being collected, stored and/or disseminated (values, power).
\n- They may not know the degree to which the identity of the student is anonymized (values).
\n- There may be a purely data-driven / quantitative approach to the use of the student data, which may lead to a narrowing of the teaching to ensure short-term targets are met at the expense of the whole learning experience / the judgement and intuition of teachers is not valued (values, power).
\n- Large amounts of teachers’ time may be taken up with the collection and entering of this data into the TailorEd database (values).
\n- Purchasing the TailorEd system may not be cost-effective, as it may involve staff training costs or the employment of staff to enter the data (values).
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: education, trust, wisdom, quantitative, qualitative, judgement, accountability, security, monitoring, power, systems, ethics, values
\n
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "19N.1.SL.TZ0.3",
"topics": [
"topic-2-concepts",
"topic-3-content"
],
"subtopics": [
"2-1-change",
"3-1-data",
"3-4-networks-and-the-internet"
]
},
{
"Question": "\n
Automated medical image analysis
\n
EBBZS IT, based in Groningen, the Netherlands, intends to develop a system using artificial intelligence (AI) to help doctors at Joelstraat Hospital interpret medical images.
\n
Due to the high resolution* of the digital images (see Figure 4), EBBZS IT claims the AI system will be able to learn from these images to assist doctors when diagnosing patients’ illnesses.
\n
EBBZS IT also claims the AI system will be able to cope with the significant increase in the volume of patients and the increased complexity of their symptoms and conditions.
\n
Figure 4: Examples of digital images used in the AI system
\n

\n
[National Institutes of Health: https://commons.wikimedia.org/wiki/File:
Human_ brain_development_1wk-3mo-1yr-2yr-10yr-T1W-MRI.PNG]
\n
\n
\n
* resolution: the detail an image holds. It can be measured in pixels per centimetre.
\n
Discuss the claim by EBBZS IT that the diagnosis of patients’ illnesses should be based on the information provided by the AI system.
\n
",
"Markscheme": "\n
Answers may include:
\n
Reasons for basing the diagnosis of the patients on the recommendations of the AI system (claim):
\n
\n- It is more likely to give consistent information (systems).
\n- It may increase the transparency / acceptability of the process if the algorithms are made available.
\n- The automation of this process may be used to improve the throughflow of patients, as diagnoses could be linked to non-serious cases only (systems, costs).
\n- It may provide a second opinion that a medical professional can use as the basis for making a decision (systems).
\n- The automation of this process may act as a method of allocating less urgent patients to nurses and leaving the more serious conditions to doctors (costs, feasibility).
\n
\n
Reasons for not basing the diagnosis of the patients on the recommendations of the AI system (counter-claim):
\n
\n- The accuracy of the diagnosis will depend on the quality/volume/range of data available in the AI system (costs, feasibility).
\n- The AI system may contain bugs or may not have been tested sufficiently (costs, feasibility).
\n- The AI system does not take into account the medical history of the patient, so cannot exhibit judgement or use intuition (values, ethics).
\n- The AI system cannot make decisions based on ethical criteria.
\n- There might be a new situation that could not be anticipated, which would be difficult for the AI system to analyse (systems, feasibility).
\n- It raises issues linked to accountability / acceptability if there are problems that emerge as a result of an incorrect diagnosis (power).
\n
\n
\n
In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: health, AI, artificial intelligence, pattern recognition, image analysis, storage, judgement, intuition, accountability, digital media, image, change, power, systems, values, ethics, feasibility, acceptability, costs
\n
Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "19N.1.HL.TZ0.6",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-1-data"
]
},
{
"Question": "\n
E-voting
\n
A number of countries, such as India, have introduced e-voting systems. Citizens can vote by going to a specified location, such as a school, or they can vote from home using a computer. Each voter is provided with a unique identifier, such as IND55454, that they must enter into the system when they vote.
\n
These e-voting systems usually consist of a user interface (see Figure 1), linked to a relational database (see Figure 2).
\n
Figure 1: An example of an e-voting interface
\n

\n
Figure 2: An example of a relational database
\n

\n
\n
Describe two features of the user interface in Figure 1 that make it intuitive.
\n
[4]
\n
a.i.
\n
\n
Outline one advantage of using a relational database to store this data.
\n
[2]
\n
a.ii.
\n
\n
A number of individuals and groups were consulted during the design of the e-voting system to enable designers to create an intuitive interface for it.
\n
Analyse questionnaires and interviews as methods of data collection to gather this information from these individuals and groups.
\n
[6]
\n
b.
\n
\n
Some states are planning to return to a paper-based voting system, where voters put a cross (X) in the column next to the party of their choice.
\n
Discuss whether these states should retain e-voting or return to a paper-based voting system.
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Appropriate use of white space…
\n- which allows the voters (users) to see the information clearly.
\n \n
\n
\n- Clear identification of part of the form where the voters add their vote…
\n- only allows the vote to be added in the correct location / field.
\n \n
\n
\n- Clear instructions…
\n- to guide voters through the voting process, such as warning that voters cannot return and change their opinions.
\n
\n
\n
Award [1] for identifying a feature of the user interface in Figure 1 that makes it intuitive and [1] for a development of that feature up to a maximum of [2].
\n
Mark as [2] + [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- It is easier to update data as it is in one location…
\n- whereas using a flat file database may mean the item of data would each have to updated in every location it is found.
\n
\n
\n- As data in one location, it will have a single format…
\n- whereas if it was in a number of different tables, the formats may be different.
\n \n
\n
Award [1] for identifying an advantage of using a relational database to store this data and [1] for a development of that reason up to a maximum of [2].
\n
a.ii.
\n
\n
Answers may include:
\n
Questionnaires:
\n
\n- Provide a mechanism to get responses from a large number of people.
\n- Provide a mechanism to obtain quantitative answers. These answers are relatively easy/quick to analyse.
\n- Are less labour intensive than using interviews.
\n- Poorly designed questions, e.g., the overuse or lack of closed questions, can yield almost meaningless information.
\n- Respondents may sometimes misunderstand or misinterpret questions; it will be very hard to correct these mistakes and collect missing data in a second round.
\n- Questionnaires do not have time constraints; respondents can take their time to complete the questionnaire in their own time.
\n- Questionnaires safeguard respondents’ anonymity, which allows for complete invisibility, maximizing comfort for those answering.
\n
\n
Interviews:
\n
\n- Provide information that may be more detailed than that obtained from a questionnaire.
\n- Require skilful interviewers to be able to take advantage of the face-to-face interactions.
\n- If the skillset of the interviewees is appropriate, the qualitative data may be used to provide more substantial conclusions than relying solely, or largely, on quantitative data.
\n- Can be very time-consuming: setting up, interviewing, transcribing, analysing, feedback, reporting.
\n- Not all respondents may be comfortable taking part in interviews and may feel nervous, especially when it is being recorded.
\n
\n
b.
\n
\n
Answers may include:
\n
Advantages of retaining e-voting:
\n
\n- The collection of the votes is more straightforward if the voting form is online (systems).
\n- Voters will have the flexibility to cast their votes from any location using online voting.
\n- The results of the election can be reported more quickly (systems).
\n- More in-depth analysis / use of data analytics of the voting patterns may occur, which may help political parties target voters during subsequent elections (systems).
\n- Electronic voting machines with touch screens are proven to be advantageous for physically challenged people (systems).
\n- Electronic voting machines can also come with audio support to assist visually impaired voters. In such cases, the visually challenged person can cast their vote without any problem (systems).
\n- Electronic voting machines allow people with disabilities to cast truly anonymous ballots and ensure them equitable rights (systems).
\n- A long-term decrease in expenses. Conducting a large-scale election can be a costly prospect, primarily because of labour costs.
\n- More convenient to transport e-voting machines than ballot papers and boxes (systems).
\n
\n
Disadvantages of retaining e-voting:
\n
\n- The biggest concern about electronic voting is hacking: there is always the risk that someone without authorization would be able to access and alter the results of an election. This could be done either in person, by physically tampering with the voting machines, or remotely, if the system transmits any kind of data over the internet (security).
\n- A hurdle for implementing widespread e-voting is the high upfront cost of installation. While electronic voting can be a cost-saving measure in the long term, the cost of setting it up may be a prohibitive factor. Costs include the servers, voting machines, maintenance and installation, testing the infrastructure, and securing the premises (systems).
\n- E-voting machines may require power backup, which may be a challenge, especially in remote locations (systems).
\n- Technical supervisors/staff may be required at the site of e-voting to deal with technical glitches (systems).
\n- The switch to e-voting may increase/exacerbate the digital divide.
\n
\n
Advantages of reverting to paper voting:
\n
\n- Implementing the technology may not be cost-effective.
\n- There are concerns about the security of the e-voting system, such as being hacked or fraudulent activities linked to the voting (values).
\n- Some people prefer the human element of paper voting (values).
\n- No technical training is required for voters: they can mark their preference on a paper ballot and drop it into the ballot box (systems).
\n- Even people with low literacy levels can easily use a paper ballot.
\n- No technical training is required for election officers deployed at the polling booths: no electronic capturing devices are in use.
\n- Paper ballots are more secure – tampering is not possible due to a physical record of votes.
\n- The paper ballot is effective in reducing fake and bogus votes, as the software of electronic voting machines can be manipulated with malware, which can be used to tamper with the election results.
\n- Statistically relevant auditing can serve as a tool to detect or deter malfunction or fraud.
\n- In the instance where a candidate is entitled to a recount, a full hand recount of paper ballots can determine the accurate or final results (reliability).
\n
\n
Disadvantages of reverting to paper voting:
\n
\n- The printing of ballots ahead of time and setting them in order is a difficult task. Printing of ballots is done district-wise, making the task even more complex.
\n- The voter may accidentally mark two boxes on the same ballot or may not mark the choice correctly. The computer software can prevent this happening (systems).
\n- With traditional paper methods, ballots must be collected from various polling locations and consolidated at a central location before a team of individuals sifts through them manually. This process is very time-consuming, leading to a significant delay in the announcement of election results.
\n- In a paper ballot, physically challenged people may have difficulty casting their votes in private.
\n- The requirement to go to a polling location continues to drive down voter turnout. Some people don’t have time to take off work, don’t live close to a polling location, or just can’t be bothered (values).
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: voting, elections, e-voting, reliability, privacy, security, digital divide, inclusion, change, power, spaces, systems, values, ethics
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "20N.1.SL.TZ0.1",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-1-data"
]
},
{
"Question": "\n
Artificial neural networks are changing surveillance
\n
Currently, security cameras record activities in supermarkets and a security guard watches the camera footage in real time. If the guard sees something suspicious, action can be taken. The company AI Security Innovations is looking at ways to further develop this technology using artificial intelligence (AI) to automate the process.
\n
The field of AI is developing rapidly and is being transformed by machine learning using artificial neural networks (ANNs). AI Security Innovations wants to link the cameras to an AI system that can distinguish between something innocent, such as a child playing with a toy gun, and a crime, such as shoplifting (see Figure 2). The AI security camera system will be designed to make the decision about whether to intervene or not. This could include “locking down” the premises to secure all exits so that a suspect cannot escape, or sending an alert in real time to the police.
\n
Figure 2: An example of a security camera
\n

\n
[Source: https://pixabay.com/photos/video-camera-surveillance-camera-3121655/]
\n
These cameras will be part of extremely sophisticated detection systems based on pattern recognition. They will be able to detect humans, rapidly separate authorized personnel from intruders, and match faces from multiple camera sources in order to track people moving from location to location. Researchers are even exploring systems that can detect the presence of concealed guns based on the way an individual walks.
\n
\n
Identify two types of artificial intelligence (AI).
\n
[2]
\n
a.i.
\n
\n
Identify two types of machine learning.
\n
[2]
\n
a.ii.
\n
\n
Outline how pattern recognition works.
\n
[2]
\n
a.iii.
\n
\n
Identify two advantages of using artificial neural networks (ANNs).
\n
[2]
\n
b.i.
\n
\n
Identify two disadvantages of using artificial neural networks (ANNs).
\n
[2]
\n
b.ii.
\n
\n
Identify two characteristics of deep learning.
\n
[2]
\n
b.iii.
\n
\n
To what extent should pattern recognition in AI systems be trusted to make decisions about sending real-time alerts to the police?
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Strong
\n- Full
\n- General
\n- Weak
\n- Narrow
\n- Domain specified
\n
\n
\n
Award [1] for identifying each type of AI up to maximum of [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- Supervised
\n- Unsupervised
\n- Reinforced learning
\n
\n
\n
Award [1] for identifying each type of machine learning up to maximum of [2].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- Images are stored in a database.
\n- A new image is input.
\n- Defining features of the new image are identified.
\n- The new image is compared to the images in a database.
\n- If the image approximates to one of the images in the database, it is recognized.
\n
\n
\n
Award [1] for identifying each aspect of how pattern recognition functions up to maximum of [2].
\n
a.iii.
\n
\n
Answers may include:
\n
\n- Can be trained to learn from past decisions.
\n- Can implement a task that a linear program cannot.
\n- Does not need to be reprogrammed.
\n
\n
\n
Award [1] for each advantage of artificial neural networks identified up to maximum of [2].
\n
b.i.
\n
\n
Answers may include:
\n
\n- Large processing requirements.
\n- Can appear black box in nature.
\n- The most accurate results may have arisen by trial and error.
\n
\n
\n
Award [1] for each advantage of artificial neural networks identified up to maximum of [2].
\n
b.ii.
\n
\n
Answers may include:
\n
\n- Includes multiple layers (usually more than three).
\n- Requires very large processing requirements.
\n
\n
\n
Award [1] for each characteristic of deep learning identified up to maximum of [2].
\n
b.iii.
\n
\n
Answers may include:
\n
Reasons why pattern recognition in AI systems should be trusted to make decisions about sending real-time alerts to police:
\n
\n- It can analyse large amounts of data, so police decisions will be based on greater information (systems).
\n- It can provide more information to police to assist them in carrying out their job (systems).
\n- Standard response to dangers can eliminate human error, such as panic responses or ill-judged responses / increase reliability and consistency.
\n- There is less chance of not noticing a dangerous situation, whereas humans can get distracted (systems).
\n- The AI system can react faster than a human to suspicious circumstances.
\n
\n
Reasons why pattern recognition in AI systems should not be trusted to make decisions about sending real-time alerts to police:
\n
\n- Unlike humans, the AI system cannot make decisions based on ethical criteria.
\n- Creating rules that take into account all of the possible ethical dilemmas may not be possible and cannot always determine right from wrong (systems).
\n- If unsupervised learning is used, the AI may self-learn and arrive at decisions that may not be appropriate (systems, algorithms).
\n- There may be inherent biases in the algorithms.
\n- The AI could become unreliable due to a glitch in the system.
\n- There might be a new situation never anticipated by the AI system.
\n- The AI system may be seen as a form of monitoring, concerns about the loss of privacy.
\n- There is the problem of accountability. At what point can the AI system, or the programmers, etc., be held accountable for an error?
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: policies, laws, regulations, automation, reliability, privacy, monitoring, surveillance, trust, transparency, accountability, algorithms, bias, change, power, systems, values, ethics
\n
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "19N.1.SL.TZ0.4",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-6-artificial-intelligence",
"3-1-data"
]
},
{
"Question": "\n
BYOD at Xingu Academy
\n
Some students at Xingu Academy have been allowed to “bring your own device (BYOD)” into school so they can use assistive technologies, such as speech-to-text, to support their learning (see Figure 3). Mayu Jimenez, the Head of Learning and Teaching, has seen the benefits for these students. A number of other teachers believe there will be benefits if the school becomes a BYOD school. However, before a decision can be made, Alejandro Gandolla, the Head of IT, has been asked to investigate whether the school would be able to cope with the demands of the increased number of devices.
\n
Figure 3: Assistive technologies
\n

\n
\n
Identify two pieces of information that would be used to identify a device on the IT network.
\n
[2]
\n
a.i.
\n
\n
Identify the steps used by speech-to-text software.
\n
[4]
\n
a.ii.
\n
\n
Digital citizenship is included in Xingu Academy’s IT acceptable use policy.
\n
Explain why it is important that students at Xingu Academy are both competent users of digital technologies and good digital citizens.
\n
[6]
\n
b.
\n
\n
Discuss whether Xingu Academy should become a bring-your-own-device (BYOD) school.
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- MAC address
\n- IP address
\n- User’s credentials, such as username
\n- Computer name
\n
\n
\n
Award [1] for identifying each piece of information the IT department would use to identify the device on the IT network, up to a maximum of [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- A student speaks a word / microphone used to capture voice.
\n- The software converts the analogue word to digital sound.
\n- The software converts sound to text based on a database of sounds.
\n- The word is matched (against the words in a database) to see if it is a valid word.
\n- If the word is found in the database…
\n- a word is presented on screen.
\n- If the word is not found in the database…
\n- a wrong word / the closest match / software makes a suggestion / an error message appears. \n
\n
\n
\n
Award [1] for identifying each step that the text-to-speech software uses up to a maximum of [4].
\n
a.ii.
\n
\n
Answers may include:
\n
Reasons for being competent users of digital technologies:
\n
\n- To be able to use digital technologies to support their learning.
\n- To be able to use software tools appropriately to maximize their efficiency.
\n- To develop a set of transferable skills they can take beyond school.
\n- To be able to access a wide range of online resources.
\n- In order to take responsibility for their personal devices – ensure they are in working order and keep hardware and data secure. In a BYOD school, technicians may not be able to support all these diverse devices.
\n
\n
Reasons for being good digital citizens:
\n
\n- Understand that being able to use the digital technologies is not sufficient to ensure the opportunities they bring are harnessed.
\n- Appreciate that a number of ethical decisions occur when interactions with the digital technologies occur.
\n- Accept that they should be responsible for their actions when interacting with digital technologies and that some actions could have potentially negative consequences, such as employers judging prospective students by their social media profiles. So, it is important to teach students how to create online personas that project a positive and constructive image.
\n- See the need for good digital citizenship as no more than an extension of their own physical citizenship.
\n- Accept that the boundary between digital and physical citizenship can be blurred and ensure that these dual roles can be reconciled.
\n- Students must respect other users and be aware of the impacts of irresponsible online behaviour, e.g., cyber bullying.
\n- Students need to be aware of legal issues – illegally downloading games/music, crimes such as hacking/identity theft. Illegal games/hacking tools could be brought to school on their own devices.
\n- Students require digital literacy to wisely use the vast amount of information on the internet.
\n- Students need to understand that there is a digital divide – within the school/community/world – that may be accentuated at a BYOD school where some students own the latest technology. Children could put pressure on parents to buy newer devices.
\n- Students need to be aware of digital health issues – good ergonomics, risks of internet/game addiction.
\n- Students need to be aware of the need to protect their data using passwords/backup.
\n
\n
\n

\n
b.
\n
\n
Answers may include:
\n
Reasons why Xingu Academy should become a bring-your-own-device (BYOD) school:
\n
\n- There will be a significant reduction in the cost of IT hardware that can be passed on to other teachers and learning needs (such as more staff) (systems).
\n- The IT support team may not need to be so large but will need to support a wide range of devices, including the latest technology as well as old technology (systems).
\n- Students may find that they do not have to learn the software used by the school, as they have similar (or better) software installed on their device (systems).
\n- Students are already familiar and comfortable using their own technology so they can focus on the lesson (systems).
\n- Students can choose their own device type, more comfortable learning on certain devices (systems).
\n- Students’ personal mobile devices tend to be more cutting-edge, so schools can more easily stay up to date with technology – but this could present problems (digital divide/technical support) (systems).
\n- With BYOD, students are more likely to continue learning outside school hours (values).
\n- Students will be more organized with all their notes and assignments all in one place (as opposed to having them on different computers and devices in different places at school and home) (values).
\n- Students can store their data on their own personal devices, so Xingu Academy is not responsible for data storage (systems).
\n- BYOD allows opportunities for more personalized learning where students can excel at their own pace (values).
\n
\n
Reasons why Xingu Academy should not become a bring-your-own-device (BYOD) school:
\n
\n- Some teachers may not be comfortable with the new BYOD approach and may see it as technology for technology’s sake (values).
\n- Some teachers may not be familiar with the software on a student’s device (systems).
\n- The school network may not have the capacity to deal with the increased number of devices on the network (systems).
\n- Some students will be advantaged, as they can afford much better devices than others, some may not be able to bring in a device – children may put pressure on their parents to upgrade their devices to keep up with their friends. Digital divide issues.
\n- Teachers may find it harder to monitor a student’s digital behaviour (systems).
\n- Some schools monitor students’ screens – this will raise issues if monitoring software must be installed on students’ personal devices (systems, values).
\n- The IT support team may have to install network peripherals, such as printers, onto the students’ devices (systems).
\n- The increased levels of access may lead to security concerns (systems).
\n- Students bringing their own devices to school may increase the possibility of theft.
\n- Applications may not be universal across all platforms, making it difficult for teachers to assist (systems).
\n- There may be more work for the IT department if they must support students’ personal devices.
\n- Students sometimes may forget to bring their device or charge it.
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: education, networks, BYOD, device, trust, authentication, security, VPN, cloud, change, power, spaces, systems, values, ethics
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "20N.1.SL.TZ0.2",
"topics": [
"topic-3-content",
"topic-1-introduction"
],
"subtopics": [
"3-4-networks-and-the-internet",
"3-2-algorithms",
"3-5-media",
"1-1-what-is-digital-society"
]
},
{
"Question": "\n
Sharing dashcam* footage with police
\n
Many police departments have started campaigns to encourage members of the public to upload footage of possible offences committed by drivers to police websites. The police are looking for footage of activities such as dangerous driving and driving whilst talking on a cellphone/mobile phone.
\n
Members of the public can create an account on the police website to upload footage from their dashcam (see Figure 3). They can also upload their dashcam footage anonymously.
\n
The police claim that using dashcam footage uploaded by the public will help reduce the number of accidents caused by dangerous driving.
\n
Figure 3: An example of a dashcam
\n

\n
\n
\n
* dashcam: a video camera mounted in a vehicle to record activity on roads
\n
Discuss whether this dashcam footage should be used by the police as part of their strategy to reduce the number of accidents caused by dangerous driving.
\n
",
"Markscheme": "\n
Answers may include:
\n
Advantages of a using dashcam footage (claim):
\n
\n- There are a lot of dashcams in use, whereas there is a limit to the number of police on patrol, so more information can be gathered.
\n- Some of the dashcam footage may be seen as entrapment (ethics, values).
\n- The use of dashcam footage may have the effect of citizens improving their behaviour as they are aware they are being filmed (ethics, values).
\n- It may be used to corroborate the evidence gathered by the police and/or CCTV cameras (systems, power).
\n
\n
Disadvantages of a dashcam footage (counter-claim):
\n
\n- The use of dashcam footage may not be admissible as evidence in court / may not be considered reliable / acceptability.
\n- The dashcam footage may not be data stamped or may be doctored / falsified (ethics, values).
\n- Additional police servers may be required to store the large amount of dashcam footage / data provided (systems, feasibility).
\n- There may be data protection / privacy / anonymity issues / regulations, feasibility relating to the storage and use of the dashcam footage.
\n- The quality of the dashcam footage may not be of a standard that is usable (systems, interoperability, feasibility).
\n- The format of the dashcam footage may not be compatible with the police software (systems, interoperability, feasibility).
\n
\n
\n
In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: authenticity, anonymity, surveillance, bandwidth, storage, security, cloud, digital media, change, power, systems, values, ethics, feasibility, acceptability
\n
Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "19N.1.HL.TZ0.5",
"topics": [
"topic-2-concepts"
],
"subtopics": [
"2-1-change"
]
},
{
"Question": "\n
Airport luggage control
\n
Large airports need to handle thousands of pieces of luggage (including suitcases and other types of baggage) from the moment passengers check them in at the counter until the moment they arrive at their final destination. Sometimes a passenger will change airplanes during their journey, so their bags will need to be transferred by conveyor belt from one plane to another.
\n
When the passenger checks in at the airline counter, a tag is printed and attached to each piece of luggage (see Figure 2). This tag has information about the passenger and their journey printed on it and also shows both a barcode and a ten-digit number that are unique to each piece of luggage.
\n
Figure 2: A luggage tag
\n

\n
[Image by AlexStef at English Wikipedia. Dca-baggage-tag.jpg (https://commons.wikimedia.org/wiki/File:Dca-baggage-tag.jpg). Under copyright and licensed under a Creative Commons Attribution 3.0 International License, https://creativecommons.org/licenses/by-sa/3.0/deed.en]
\n
The luggage then goes on to a number of conveyor belts that take each bag to where it needs to go. Conveyor belts connect to other conveyor belts that direct luggage from the airport building to the correct airplane, from one airplane to the next if the passenger changes airplanes during the journey, or to the baggage reclaim area at the end of the journey. The airport luggage control system will know when to push the bag from one conveyor belt to another to ensure it gets to the correct destination.
\n
\n
The barcode allows the airport’s luggage control system to access a database containing information about each piece of luggage.
\n
\n
Identify two pieces of information about the luggage that may be obtained from this database.
\n
[2]
\n
a.i.
\n
\n
Identify the steps taken by the luggage control system to decide which conveyor belt to choose when a bag reaches a junction between two conveyor belts.
\n
[4]
\n
a.ii.
\n
\n
Analyse the decision by some airports to attach radio frequency identification (RFID) tags to luggage when it is checked in by the passenger, instead of barcode paper printed tags.
\n
[6]
\n
b.
\n
\n
Airlines have databases that contain data about passengers when tickets are booked. This data includes travel dates, itineraries, contact details, passport details and passengers’ home addresses. When passengers purchase a ticket online from an airline company, they have to accept the airline’s terms and conditions by clicking “Agree” (see Figure 3).
\n
Figure 3: Acceptance of airline terms and conditions
\n

\n
Within these terms and conditions, it states that the airline may receive a request to share this data with the government of the country to which the passenger is flying.
\n
Discuss whether airlines should share passengers’ data with the governments of the countries to which they are flying.
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Destination
\n- Passenger name/surname
\n- Weight of the bag
\n- Route of the complete journey (e.g., point of departure / transfers)
\n- Flight information (flight number, airline)
\n
\n
\n
NB: Do not accept simply “journey” – sufficient detail must be given.
\n
Award [1] for identifying each piece of information about the luggage that may be obtained from this database up to [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- Barcode reader reads barcode of bag arriving junction.
\n- System looks for code/finds code in the database.
\n- System retrieves the flight number (accept destination of the flight) that the bag needs to be delivered to from the record associated with that code.
\n- System also retrieves data identifying which conveyor has been assigned to deliver bags for that flight number.
\n- If the new conveyor has been assigned to the same flight number as the bag, the bag is pushed onto the new conveyor.
\n- If not, the bag continues on the original conveyor.
\n
\n
\n
NB: Responses must make reference to the IT system(s) involved.
\n
Award [1] for identifying each of the steps taken by the system to decide if a bag is pushed to a different conveyor or not when arriving at a junction up to [4].
\n
a.ii.
\n
\n
Answers may include:
\n
Advantages of barcodes on printed tags:
\n
\n- Tags have information that is visible and readable by people.
\n- Workers may re-route luggage if needed as information is readable.
\n- Printing may be cheaper than RFID tags.
\n
\n
Disadvantages of barcodes on printed tags:
\n
\n- Barcodes need to be in the line of sight with the barcode-reading device.
\n- Paper tags may get dirty or broken.
\n- Papers with barcodes may not deliver the information if they are damaged (and paper tags are easily damaged).
\n- Barcode tags are more labour intensive – need to be printed and physically attached by airport staff.
\n
\n
Advantages of RFID tags:
\n
\n- Can be read by RFID reader from a greater distance/no need to have tag in line with reader.
\n- RFID tags can have more information than a set of numbers in a barcode.
\n- Can be reused (if returned – or by frequent flyers).
\n- Are read at a faster rate than barcodes.
\n- May not get damaged with handling as easy as paper tags.
\n- RFID are read/write devices – information may be added along the way.
\n- RFID tags more secure – can be encrypted.
\n- More than one tag can respond at the same time – (so bags hidden under other bags would still be detected, etc.).
\n
\n
Disadvantages of RFID tags:
\n
\n- More expensive.
\n- If system fails, then there may not be information on tag readable by a person/ possible delays in baggage processing.
\n- Possible that they are read by unauthorized users.
\n- Used tags are more difficult to destroy/deactivate than paper barcodes/ discarded tags pose a potential privacy issue for the traveller.
\n
\n

\n
b.
\n
\n
Answers may include:
\n
\n- Airlines or passengers may see sharing this information as unethical or a breach of privacy, which may raise wider issues and affect their business or business model.
\n- Airlines may feel that if passengers are aware that the airline shares their data, they may decide not to use the airline and opt for one that does not have data sharing agreements.
\n- \nSharing passenger data might help protect countries from terrorist attacks or other criminal activities (e.g., passengers may be on a “watch list” in the destination country).
\n- Sharing passenger data may allow governments to respond more effectively if the passenger needs to be traced/contacted urgently during their stay in the country.
\n- Governments can use data analytics to track and analyse tourism data for planning workforce, infrastructure etc.\n
\n- Will the additional time and effort the airline spends on highlighting this data sharing agreement be cost-effective? In other words, do passengers need to know or are passengers likely to care (values)?
\n- Airlines may feel that passengers may not be concerned about their data being shared, or they may just accept that this will happen as it is “out there”, regardless of whether they agree with it or not (values).
\n- If airlines group together, they could form associations that can set policies about what data should be shared/should not be shared with governments, which may make passengers feel more confident about the confidentiality of their data.
\n- Governments may require that airlines make this data sharing available and part of the ticket purchasing process, so the decision may be effectively made for the airline (power, values).
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: business, regulation, policies, privacy, anonymity, security, data, analytics, change, power, systems, values, ethics
\n
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "21N.1.SL.TZ0.2",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-1-data",
"3-2-algorithms"
]
},
{
"Question": "\n
Wildfire modelling
\n
The fire control centre in the Kinakora National Park in New Zealand often has to cope with the natural phenomenon of wildfires. Staff have been collecting data about wildfires since 1970.
\n
The size of each wildfire is measured, and the vegetation types affected are recorded. Data on the weather conditions is collected from sensors in the park. The staff at the fire control centre use this information to fight the wildfire.
\n
A new computer modelling system is being developed using data collected from previous wildfires. This new system will improve the quality of the information available when fighting future wildfires.
\n
The new system will also enable staff at Kinakora National Park to send information to tourists in the park to warn them when they are in danger from a wildfire.
\n
\n
Identify two measurements that could be taken by the weather sensors in Kinakora National Park.
\n
[2]
\n
a.i.
\n
\n
Identify two methods that could be used to train the staff to use the new computer modelling system.
\n
[2]
\n
a.ii.
\n
\n
Identify two methods of visualization that could be used to present information from the new computer modelling system.
\n
[2]
\n
a.iii.
\n
\n
Two methods for informing tourists about wildfires in Kinakora National Park are:
\n
\n- short message service (SMS) texting/text messaging
\n- posting information on the Kinakora National Park website.
\n
\n
Analyse these two methods.
\n
[6]
\n
b.
\n
\n
Evaluate Kinakora National Park’s decision to use computer modelling to develop strategies for dealing with wildfires.
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Temperature
\n- Rainfall/precipitation
\n- Wind speed
\n- Wind direction
\n- Humidity
\n
\n
\n
Award [1] for identifying each measurement up to maximum of [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- Video tutorials
\n- “How to” guides
\n- Face-to-face training
\n- Online training courses
\n
\n
\n
Award [1] for identifying each method that could be used to train the staff to use the new modelling system up to maximum of [2].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- Charts
\n- Tables
\n- Infographics
\n- Diagrams
\n
\n
\n
Award [1] for identifying each method of visualization up to maximum of [2].
\n
a.iii.
\n
\n
Answers may include:
\n
Advantages of using SMS texting:
\n
\n- It is easy to use.
\n- Information is pushed out to the tourists.
\n- It is not dependent on internet access (systems).
\n- It is cheap.
\n- It is low tech / can be done from very old hardware.
\n- It is faster than posting information in a website / synchronous.
\n
\n
Disadvantages of using SMS texting:
\n
\n- Tourists need phone reception to get the message.
\n- The national park needs all tourists’ phone numbers to ensure all tourists can access this information.
\n- Data needs to be stored (phone numbers), so an appropriate privacy policy needs to be in place.
\n- There is no guarantee the message has got through.
\n- Some tourists might not have their phone with them.
\n- Batteries can run out.
\n
\n
Advantages of using the Kinakora National Park website:
\n
\n- The information can use graphics/maps.
\n- It is not necessary to collect/store tourists’ phone numbers.
\n
\n
Disadvantages of using the Kinakora National Park website:
\n
\n- Tourists need to visit the website to get information.
\n- Tourists may not have web access.
\n- Visually impaired visitors might not get the information.
\n
\n
\n
Note: Many of the advantages of SMS text are automatically disadvantages of Kinakora National Park website or vice versa.
\n

\n
Keywords: connectivity, change, systems, values, ethics
\n
b.
\n
\n
Answers may include:
\n
Advantages of using computer models to develop strategies to deal with wildfires:
\n
\n- Many different scenarios can be tried out before a final strategy is determined (systems).
\n- Dangerous situations can be simulated without the risk to human life (systems, values).
\n- Possible fires can be predicted, and strategies can be defined to deal with them (systems).
\n- The development of the model may lead to a greater understanding of the factors that influence the start and spread of forest fires; e.g., fires starting in similar circumstances may not always follow same pattern.
\n- Models may be revised as the nature of forest fires evolves, e.g., as a result of drier conditions, hotter summer temperatures (systems).
\n- Models can be used for training (systems).
\n
\n
Disadvantages of using computer models to develop strategies to deal with wildfires:
\n
\n- The data that is being input / data must be reliable / GIGO.
\n- The model is a simplification of a real situation and there may be factors that it is not possible to consider (systems).
\n- It is expensive to develop a model / requires a large amount of processing power, and this may not be an effective use of resources.
\n- The conditions in the national park may evolve more quickly than the model is able to, which may lead to predictions not being as accurate as expected (systems).
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: environment, monitoring, data, GIGO, model, modelling, simulations, algorithms, change, systems, values, ethics
\n
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "19N.1.SL.TZ0.2",
"topics": [
"topic-3-content",
"topic-4-contexts"
],
"subtopics": [
"3-1-data",
"4-5-human-knowledge"
]
},
{
"Question": "\n
Human genome research
\n
MediResearch, a US-based DNA testing company, has a relational database of human genome information. An individual’s genome data represents private information about their past, their present and, potentially, their future. This information is stored in a relational database.
\n
The senior managers at MediResearch are considering using data analytics but are concerned this may compromise the anonymity of the individuals who have provided their DNA.
\n
\n
Identify two features of a relational database.
\n
[2]
\n
a.i.
\n
\n
Identify two reasons why a relational database, rather than a flat-file database, is used to store the data for MediResearch.
\n
[2]
\n
a.ii.
\n
\n
Identify two features of data analytics.
\n
[2]
\n
a.iii.
\n
\n
MediResearch is looking to expand access to the genome data it holds by sharing it with other companies.
\n
Explain three strategies that MediResearch could use to ensure the security of the genome data.
\n
[6]
\n
b.
\n
\n
The chief executive officer of MediResearch is considering using cloud-based storage to store the genome data.
\n
Discuss whether MediResearch should move to cloud-based storage.
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Multiple tables
\n- Joins between tables
\n
\n
\n
Award [1] for identifying each feature of a relational database up to [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- Removes update anomalies / updates are easier, as data is only stored once.
\n- Removes the risk of data redundancy.
\n- Reduces storage requirements.
\n
\n
\n
Award [1] for identifying each reason why a relational database is used to store the data for MediResearch up to [2].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- The practice of interrogating (large) databases / data sets.
\n- Uncovers patterns in the data that would not normally be apparent.
\n
\n
\n
Award [1] for each characteristic of data analytics identified up to [2].
\n
a.iii.
\n
\n
Answers may include:
\n
\n- Using additional authentication processes, such as a PIN or a text/SMS…
\n- which will mean a second device is required for authentication to take place.
\n \n
\n
\n- Setting different levels of access so only specified employees have access to the most sensitive data…
\n- meaning less likelihood of this sensitive data being accessed.
\n \n
\n
\n- Designing the database so that the most sensitive data is placed in a table that only specified employees have access to…
\n- reducing the likelihood of this sensitive data being accessed.
\n \n
\n
\n- Encryption on the stored data…
\n- will ensure only users or devices who are authorized can access the stored data.
\n \n
\n
\n- VPN/encryption when transferring the data to other companies…
\n- will ensure that if data is intercepted it is not compromised.
\n \n
\n
\n- Creating policies/agreements between parties…
\n- which will dictate the way the data can be shared and used.
\n
\n
\n
Award [1] for identifying each policy and [1] for a development of the policy identified up to [2].
\n
Mark as [2] + [2] + [2].
\n
b.
\n
\n
Answers may include:
\n
Advantages of cloud-based storage:
\n
\n- No need for them to invest in storage infrastructure on site (systems).
\n- Data security will be provided by the company responsible for the cloud-based storage.
\n- Data backup facilities will be provided by the company responsible for the cloud-based storage (systems).
\n- Collaborating and sharing genome data with other data companies or external scientists will be more convenient (systems).
\n- Accessibility – having the data on the cloud will enable the MediResearch scientists to work remotely using an internet connection (systems).
\n- Scalability – MediResearch can expand or reduce storage capacity subscription on a needs basis (systems).
\n
\n
Disadvantages of cloud-based storage:
\n
\n- The data may be managed by a third party, which could cause issues linked to its use / security.
\n- \nMediResearch may feel that data security may be more easily compromised.
\n- The company will have to ensure that they have enough internet bandwidth for data accessibility.
\n- \n Storing data in the cloud may sometimes be difficult – MediResearch’s existing data management may not integrate well with the cloud vendor’s system (systems).
\n- Considering the nature and sensitivity of the genome data held by MediResearch, the government policies of the country where the cloud storage unit is placed may influence the way data is stored/used or shared (values).
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: health, policies, laws, regulations, data, security, privacy, anonymity, cloud, bandwidth, change, power, systems, values, ethics
\n
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "21N.1.SL.TZ0.3",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-1-data"
]
},
{
"Question": "\n
Investigation of ocean disasters
\n
A system called the Marine Accident Data Analysis Suite (MADAS) uses data collected from marine accidents to create models that are used as part of a simulation1 to help understand what has happened (see Figure 2).
\n
Figure 2: An example of a MADAS model
\n

\n
Cruise ships are required to carry a voyage data recorder (VDR), which uses sensors to monitor the conditions in the ship at all times. The data from the sensors is collected and input into a relational database2 (see Figure 3) that is a part of the MADAS system (see Figure 4).
\n
Figure 3: Part of the relational database in the MADAS system
\n

\n
Figure 4: The MADAS system
\n

\n
\n
\n
1 simulation: a computer simulation is the usage of a computer for the modelling of a real-world process or system
\n
2 relational database: a database that consists of one or more tables where there are pre-defined relationships between the data elements
\n
[Figure 2: With permission from the International Union of Marine Insurance. Source adapted.]
\n
\n
The voyage data recorder (VDR) gathers information during a voyage.
\n
\n
Identify three sensors that may be used to detect data about the weather conditions.
\n
[3]
\n
a.i.
\n
\n
Identify three advantages of using a relational database rather than a flat-file database.
\n
[3]
\n
a.ii.
\n
\n
There are concerns about the reliability of the data being input into the MADAS system.
\n
Explain why data validation and data verification are used to ensure the reliability of the data being input into the MADAS system.
\n
[3]
\n
b.i.
\n
\n
The MADAS system uses data visualization.
\n
Explain why data visualization is used by the MADAS system.
\n
[3]
\n
b.ii.
\n
\n
To what extent can the use of models and simulations like the MADAS system help prevent future accidents?
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- (Atmospheric) pressure
\n- Temperature
\n- Wind (speed/direction)
\n- Humidity
\n- Rain / precipitation / water level (BOD)
\n- Sunlight
\n
\n
\n
Award [1] for identifying each sensor that may be used to detect data about weather conditions up to a maximum of [3].
\n
a.i.
\n
\n
Answers may include:
\n
\n- Any item of data is only entered once, which eliminates redundant data.
\n- Reduces the amount of storage space needed for the database.
\n- Reduces the chance of an error occurring.
\n- (Normalization) reduces the chance of anomalies (e.g., update / deletion / insertion).
\n- Improves security of the data, as different permissions can be added to different tables.
\n- Quicker to enter and update data.
\n
\n
\n
Award [1] for identifying each advantage of a relational database rather than using a flat-file database up to [3].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- Data validation is the process of ensuring the data entered is valid (clean, correct and useful) using computer-based rules (e.g. presence check, length check, type check, range check etc).
\n- Data verification is the process of checking what has been entered is correct compared to the original (integrity) or by entering the data twice and comparing the instances of the data entry.
\n- The combination of validation and verification ensures that the data can be checked most efficiently. Validation prevents erroneous data being added so that only a smaller subset of the data needs to be manually checked (verification).
\n
\n
\n
Award [1] for a definition of data validation.
\n
Award [1] for a definition of data verification.
\n
Award [1] for a statement that explains why both validation and verification is necessary.
\n
b.i.
\n
\n
Answers may include:
\n
\n- Visualization is story telling with images, graphs and charts.
\n- It uses mathematical operations to model events that enables complex data to be presented in a way that can be easily understood.
\n- Allowing the easy identification of trends to make connections between operations and results / to identify future problems which may arise / predict accidents.
\n
\n
\n
Award [1] for identifying a reason why data visualization is used by the MADAS system and [1] for each subsequent development of that reason up to [3].
\n
b.ii.
\n
\n
Answers may include:
\n
Advantages:
\n
\n- There is a lot of data and if this is put together usefully then the causes of the accident can be better understood (systems).
\n- Understanding the accident will mean that mitigation strategies can be developed (systems).
\n- If the model/simulation was part of a training programme, then the simulations could be used to teach future boat pilots how to avoid the same kind of accidents.
\n- Cheaper to run a model/situation through a simulation to see what will happen than to wait for it to happen in real life (cost).
\n- The information from the model and simulation may allow the authorities to make changes to the regulations.
\n- “What if” models/simulations can be easily run to observe the effects of changes in behaviour or conditions (values/ethics).
\n
\n
Disadvantages:
\n
\n- \nModels/Simulations are only as accurate/reliable as the data which is given to them. GIGO.
\n- \nModels/Simulations might be biased because they have been created by a particular organization / company.
\n- \nModels/Simulations are not the real thing so even if a person has trained on a simulation, there is no guarantee that this will mean they will know what to do if facing a possible accident.
\n- Too many variables to account for and it is unclear which of these might have made the accident worse or better (systems, data, algorithms).
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: transport, infrastructure, data, algorithm, accuracy, reliability, model, modelling, training, environment, systems, ethics, values
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "22M.1.SL.TZ0.2",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-3-computers",
"3-1-data"
]
},
{
"Question": "\n
Schools told not to use cloud computing software applications
\n
Schools in the German state of Hesse will no longer be able to use cloud computing services with software applications, such as G Suite and Office 365, due to new data protection rules. This has identified the risk of schools’ data being stored and accessed by third parties from outside of Germany.
\n
In contrast, many schools in other parts of the world use cloud computing services and software applications. These applications allow students to access software that was previously only installed on their computers.
\n
\n
Identify two types of cloud computing software applications that students might use at school.
\n
[2]
\n
a.i.
\n
\n
If the schools in Hesse can no longer use cloud computing software applications, they will need to store their data on a local file server and access it through a local area network (LAN).
\n
Identify two ways in which data could be secured if the school stored it locally.
\n
[2]
\n
a.ii.
\n
\n
Identify two ways in which students could authenticate themselves on their local area network (LAN).
\n
[2]
\n
a.iii.
\n
\n
The European Union’s (EU) General Data Protection Regulation (GDPR) governs data protection and privacy in the EU. Its regulations give users certain rights in terms of their data.
\n
Explain three principles that should be included in data protection regulations such as GDPR.
\n
[6]
\n
b.
\n
\n
A new school has opened in Switzerland, and its principal and IT manager are considering two options:
\n
Option 1: Using a local client–server network.
\n
Option 2: Using a cloud-based service.
\n
Evaluate these two options.
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Word processor: Google Docs / Microsoft Word.
\n- Spreadsheet: Google Sheets / Microsoft Excel.
\n- Email: Gmail / Microsoft Outlook.
\n- Presentation: Google Slides / Microsoft PowerPoint / Apple Keynote.
\n- Website design: Google Sites.
\n- Calendars: Google Calendar.
\n- Online forms: Google Forms / Microsoft Forms.
\n- Collaboration tools: Microsoft Teams / Google Classroom.
\n- Storage apps: Microsoft OneDrive / Google Drive.
\n- Video Communication: Zoom, Skype, Teams, Meet etc.
\n- Learning Management Systems: Blackboard/ Moodle / PowerSchool / Canvas / Schoology etc.
\n
\n
\n
Award [1] for identifying each application up to [2].
\n
Note to examiners:
DO NOT accept Microsoft Office / Office 365 / Google Workspace / Gsuite as these are mentioned in the stimulus materials on the question paper.
\n
a.i.
\n
\n
Answers may include:
\n
\n- Different levels of access
\n- Login (username and password / biometrics)
\n- Firewalls, proxy server
\n- Encryption
\n- Audit trails
\n- Anti-virus / anti-malware software
\n- Physical security of the servers
\n
\n
\n
Award [1] for identifying each way the data can be stored securely up to [2].
\n
a.ii.
\n
\n
Answers may include:
\n
\n- Single-factor/primary authentication
\n- Two-factor authentication (2FA)
\n- Single sign-on (SSO)
\n- Multi-factor authentication (MFA)
\n
\n
\n
Award [1] for identifying each way in which students could authenticate themselves on their local area network (LAN), up to [2].
\n
a.iii.
\n
\n
Answers may include:
\n
\n- The right to know who has access to my data
\n- … and for the purposes it is being used for.
\n \n- The level of security used to protect the data
\n- … so only appropriate users of the data have access.
\n \n- The purpose that the data will be used for
\n- … will it be shared with third parties?
\n \n- Data will not be processed without informed consent from the owner
\n- … unless there is a legal requirement to process the data.
\n \n- Requires that the holder of the data controller provides information to the data subject
\n- … in a concise, transparent, intelligible and easily accessible form, using clear and plain language.
\n \n- The data subject has the right to be forgotten
\n- … so data can be deleted after it has served its required purpose.
\n \n- Data should be stored on a server within the same country or within a country with similar data protection legislation in place.
\n- … so that the owner of the data is sure that its security remains protected.
\n
\n
\n
Award [1] for identifying a principle that should be included in data regulation principles such as GDPR and [1] for a development up to [2].
\n
Mark as [2] + [2] + [2].
\n
b.
\n
\n
Answers may include:
\n
\n
Option 1:
\n
Advantages
\n
\n- The management of the client–server network can be carried out in-house which will mean the way in which the network is set up can be tailored to the school’s needs (systems).
\n- There will be fewer costs to external agencies for the upkeep of the network i.e. there is no monthly fee / subscription fees, etc., which will need to be managed by the IT manager.
\n- The IT manager will have complete knowledge about where their data is held.
\n- A client–server network allows in-house control of backup and security (this could be argued from both sides depending on the competency of the IT staff).
\n- The principal will be able to claim the data is more secure as it is housed on a school server instead of on a third-party server (systems).
\n
\n
Disadvantages
\n
\n- The hardware costs for network infrastructure as well as software licensing costs will need to be paid by the school and managed by the IT manager/principal (costs).
\n- The IT manager/principal will need to employ staff who can manage the network and maintain the hardware or arrange for this to be outsourced (costs).
\n
\n
\n
Option 2:
\n
Advantages
\n
\n- The management of the client–server network can be carried out remotely by the cloud service provider which will mean that IT manager will not have to carry out a number of tasks linked to the maintenance of the network (feasibility).
\n- The cloud-based provider will provide backing up facilities as part of the service so the IT manager will not have to address this issue (reliability, systems).
\n- The cloud-based provider will be able to provide up-to-date versions of software and services more efficiently than the IT manager who may have to buy them in after carrying out due diligence (systems).
\n- Increasing the storage capacity of the network would be easily done by requesting this from the cloud service provider (systems). No additional hardware or infrastructure will be required (cost, feasibility).
\n
\n
Disadvantages
\n
\n- There will still be a need to have some hardware and software on site (for example print servers) which will need to be purchased and maintained by the IT manager (cost, systems).
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: education, data, security, reliability, network, cloud, client, server, systems, ethics, values, cost, feasibility
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "22M.1.SL.TZ0.3",
"topics": [
"topic-3-content",
"topic-1-introduction",
"topic-2-concepts"
],
"subtopics": [
"3-4-networks-and-the-internet",
"3-1-data",
"1-1-what-is-digital-society",
"2-1-change"
]
},
{
"Question": "\n
China's social credit scheme
\n
The Chinese government is proposing a social credit scheme that will reward its citizens with points for what it considers to be good behaviour. This can be done by monitoring citizens’ social media connections, purchasing history and location data.
\n
CCTV cameras are widely used in China, and there are concerns that facial recognition technology that uses artificial intelligence (AI) is already being utilized by the government to detect “good” and “bad” behaviours of its citizens. The facial recognition system requires high-resolution images*.
\n
\n
* high-resolution images: images that are of a quality that allows them to be used for printing. Usually this means they are 300 pixels per inch.
\n
\n
Identify two types of image file.
\n
[2]
\n
a.i.
\n
\n
Describe the difference between monitoring and surveillance.
\n
[2]
\n
a.ii.
\n
\n
Describe the difference between identification and authentication.
\n
[2]
\n
a.iii.
\n
\n
Other governments are considering setting up similar systems that will use facial recognition to gather information about the behaviour of its citizens.
\n
Explain why the developers of the new facial recognition system would need both primary and secondary data collection.
\n
[3]
\n
b.i.
\n
\n
Explain why using high-resolution images could be a challenge to the implementation of a facial recognition system.
\n
[3]
\n
b.ii.
\n
\n
Discuss the advantages and disadvantages of a government using a facial recognition system that uses artificial intelligence (AI) to monitor the behaviour of its citizens.
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- jpg / jpeg
\n- tiff
\n- png
\n- bmp / bitmap
\n- gif
\n
\n
\n
Award [1] for identifying each file type up to [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- Monitoring is the passive/authorized observation of people, processes, and activities (with their consent).
\n- Surveillance is the covert/unauthorized observation of people, processes, and activities (without their consent).
\n
\n
\n
Award [1] for a definition of monitoring.
Award [1] for a definition of surveillance.
\n
a.ii.
\n
\n
Answers may include:
\n
\n- Identification – uniquely identify a user on a digital system (and takes place before authentication).
\n- Authentication – confirming the identity of a person/the person is who they say they are (occurs after identification).
\n
\n
\n
Award [1] for a definition of identification.
Award [1] for a definition of authentication.
\n
a.iii.
\n
\n
Answers may include:
\n
\n- Primary data collection, such as collecting potential users interacting with the facial recognition system, would provide information about these interactions in real time. Interviews with developers of similar systems would provide rich and nuanced information.
\n- Secondary data collection may involve gathering information about existing facial recognition systems and would provide a wider knowledge base for making informed decisions.
\n- Combining the real-time interaction of potential users with the facial recognition system and the data obtained from literature reviews will provide the greatest quantity of information and enable the developers to make informed decisions about the best way to develop the facial recognition system.
\n
\n
\n
Award [1] for identifying a reason why the developers of the new facial recognition system would need both primary and secondary data collection and [1] for each subsequent development of that reason, up to [3].
\n
b.i.
\n
\n
Answers may include:
\n
\n- High resolution images may require a longer transfer time.
\n- Which will require computers with high specifications to be processed in a timely manner.
\n- May require considerable storage space.
\n- May require lossy compression to transfer them quickly which may lead to a reduction in the quality / usefulness of the image.
\n- The cost of purchasing the equipment required to obtain high resolution images.
\n
\n
\n
Award [1] for identifying a reason why having images with a higher resolution could be a challenge to the implementation of a facial recognition system and [1] for each subsequent development of that reason up to [2].
\n
b.ii.
\n
\n
Answers may include:
\n
Advantages:
\n
\n- May improve people’s behaviour as they will know they are being watched (values, ethics).
\n- May stop crime before it happens meaning fewer people in jail or in court (values, ethics, monitoring). Similar to a speeding camera but for people.
\n- Might need fewer police to patrol and put themselves in danger (cost).
\n- Could help to improve the physical environment by catching those who litter / responsible for polluting the environment.
\n- Could allow people to be more accurately identified leading to fewer false accusations/prosecutions (reliability, trust).
\n- Allows the government to track and apprehend criminals i.e., makes society safer as criminals are caught (monitoring).
\n- AI will be more efficient than manual checking and may learn from its experiences (systems). \n
\n
\n
Disadvantages: ·
\n
\n- Feeling of being watched will be bad for morale of population (ethics, power, surveillance).
\n- May lead to a distrust in the government (trust, values).
\n- Might be punished incorrectly (or rewarded incorrectly) if the facial recognition fails (reliability, systems).
\n- Criminals might just find other ways of committing crime, such as wearing masks or avoiding the cameras (values).
\n- People wear masks (against pollution) or hats which cover their faces (when it is very cold), won’t be recognized that easily (reliability).
\n- Invasion of privacy as people are never able to not be under surveillance.
\n- May take up considerable resources in developing and maintaining the data and hardware (cost).
\n- Facial recognition is not that accurate so there might be many false positives (reliability, systems, accountability).
\n- AI may have inherent biases, e.g., it may not recognize particular physical features (values, ethics). \n
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: government, data, algorithm, accuracy, reliability, model, monitoring, surveillance, power, systems, ethics, values, trust, accountability, cost, feasibility
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "22M.1.SL.TZ0.4",
"topics": [
"topic-3-content"
],
"subtopics": [
"3-1-data",
"3-4-networks-and-the-internet",
"3-5-media"
]
},
{
"Question": "\n
Cameras in school
\n
The principal at Flynn School has received requests from parents saying that they would like to monitor their children’s performance in school more closely. He is considering extending the school’s IT system by installing cameras linked to facial recognition software that can record student behaviour in lessons.
\n
The facial recognition software can determine a student’s attention level and behaviour, such as identifying if they are listening, answering questions, talking with other students, or sleeping. The software uses machine learning to analyse each student’s behaviour and gives them a weekly score that is automatically emailed to their parents.
\n
The principal claims that monitoring students’ behaviour more closely will improve the teaching and learning that takes place.
\n
Discuss whether Flynn School should introduce a facial recognition system that uses machine learning to analyse each student’s behaviour and give them a score that is automatically emailed to their parents.
\n
",
"Markscheme": "\n
Answers may include:
\n
Advantages of implementing the facial recognition system:
\n
\n- May provide reassurance to students and parents about their safety while at school (values).
\n- May provide useful information to the school that could be used to feedback into possible teaching and learning strategies (values).
\n- May provide additional supporting evidence/data if there is a difference of opinions (values).
\n- May reduce the need for teachers to have to register students at the start of lessons or the beginning/end of each day, ie freeing up staff time (systems).
\n- May be able to create attendance/lateness reports if necessary (systems).
\n- May motivate students to work harder, participate frequently (values).
\n
\n
Disadvantages of implementing the facial recognition system:
\n
\n- May be seen as intrusive by students and teachers (ethics, values, surveillance).
\n- May be used as part of the management of teachers (ethics, values, surveillance).
\n- May not pick up the nuances in student and teacher interaction, for example, the context of the behaviour may be important, and this will not be recorded by the facial recognition system (systems, algorithms)
\n- Can teachers and students “game” the system, so the teaching and learning experience may be geared to satisfy the algorithms used in the facial recognition software (values, surveillance).
\n- \nCost of implementation – hardware, software.
\n
\n
\n
In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: education, acceptability, cost, anonymity, surveillance, privacy, algorithms, change, power, systems, values, ethics
\n
Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "22M.1.HL.TZ0.5",
"topics": [
"topic-2-concepts"
],
"subtopics": [
"2-1-change"
]
},
{
"Question": "\n
Robotic Surgery
\n
Sandy Parkar, the manager of a large hospital, is considering using robots controlled by surgeons to carry out surgical procedures. The surgeon uses a computer console to control the robot (see Figure 5).
\n
Figure 5: Robotic surgery
\n

\n
[Source: mathisworks / iStock.]
\n
All the robot’s movements, and the surgical procedure, are recorded. This allows information to be collected about each procedure.
\n
In 2022, a patient died while undergoing a surgical procedure in which a surgical robot was used. Sandy claims the manufacturer of the robot should be accountable. This was contested by the manufacturer, and a court case followed to determine who was accountable.
\n
Discuss whether the surgeon, the manufacturer of the surgical robot, or the hospital manager should be held accountable.
\n
",
"Markscheme": "\n
Answers may include:
\n
The surgeon is accountable if:
\n
\n- it can be proved that they did not use the robotic tools appropriately (values)
\n- they conducted the operation without having completed the required training courses
\n- they didn’t have enough experience with the robotic equipment (values).
\n
\n
The manufacturer of the surgical robot is accountable if:
\n
\n- it can be proved that the robot has failed/is unreliable (i.e., been unable to complete the task that the manufacturer has claimed it is able to do).
\n- the robot has been sold to the hospital with claims that it is able to carry out tasks it cannot perform (values).
\n- parts in the robot have not functioned properly (systems).
\n- there are errors in the software that created the problem (systems).
\n- a component of the robot was deemed defective but was not recalled (systems).
\n- the robot itself has caused an injury, e.g. unintended cauterizing burns from the robot’s cauterizing tool (systems).
\n
\n
The hospital manager is accountable if:
\n
\n- the surgeon has not been given sufficient training to be able to competently use the robot (values).
\n- the robot has been purchased and used in the hospital without due diligence (values).
\n- the system has not been properly maintained (values).
\n- \ndata that was critical to the operation of the system was not in the patient’s medical record at the hospital (values).
\n- the nurse physically in the operating room when the surgical robot was used was not qualified (i.e., lack of training, lack of experience).
\n
\n
\n
In this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: health, training, data, cost, reliability, accountability, privacy, change, power, systems, values, ethics
\n
Refer to HL paper 1 Section B markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
\n
",
"Examiners report": "\n[N/A]\n
",
"question_id": "22M.1.HL.TZ0.6",
"topics": [
"topic-5-hl-extension"
],
"subtopics": [
"5-1-global-well-being"
]
},
{
"Question": "\n
The role of portable digital devices in health
\n
Jaime is an athlete and uses his sports watch to monitor his training sessions. He also uses it to keep a record of his health and well-being. The sports watch can monitor Jaime’s vital signs. It is also global positioning systems (GPS) enabled, so it can track his location (see Figure 4).
\n
Figure 4: Data collected by a sports watch
\n

\n
The information that is recorded by Jaime’s sports watch is synchronized with a mobile application (app) installed on his cellphone/mobile phone.
\n
\n
Identify two vital signs that can be recorded by Jaime’s sports watch.
\n
[2]
\n
a.i.
\n
\n
Identify the steps that the GPS receiver in Jaime’s sports watch uses to show the routes of his training runs.
\n
[4]
\n
a.ii.
\n
\n
Jaime has decided to share his personal health information with researchers at the University of Sierra Nevada.
\n
Analyse Jaime’s decision to share his personal health information with the University of Sierra Nevada.
\n
[6]
\n
b.
\n
\n
The development of mobile health apps has changed the way citizens manage their own health and well-being.
\n
Discuss whether citizens like Jaime should rely only on the advice of a health app to manage their own health and well-being.
\n
[8]
\n
c.
\n
",
"Markscheme": "\n
Answers may include:
\n
\n- Heart rate / pulse
\n- Blood pressure
\n- Blood oxygen level / oxygen saturation
\n- Respiration rate
\n- Body temperature
\n
\n
\n
Award [1] for identifying each vital sign, up to a maximum of [2].
\n
a.i.
\n
\n
Answers may include:
\n
\n- The GPS receiver receives data from satellites that circle the earth, tracking the location of the runner as he moves.
\n- The GPS receiver receives information about the orbits of each satellite (so it knows where each satellite will be at any given moment).
\n- The GPS receiver calculates how far away from each satellite it is and therefore where it is on the surface of the earth.
\n- It measures the distance to each satellite by calculating the amount of time it takes to receive its signal.
\n- Once the GPS receiver has a minimum of three satellites in its fix, it can calculate its position on earth.
\n- It uses a process of trilateration.
\n- With two satellites in its fix, a GPS receiver can calculate its latitude and longitude (2D fix).
\n- With three satellites in its fix, a GPS receiver can calculate its latitude, longitude and altitude (3D fix).
\n- With four or more satellites in range, the GPS receiver can compensate for time differences between the receiver’s clock and the satellites’ clocks.
\n- Using the location data, the route can be displayed on a map (GIS software).
\n
\n
\n
Award [1] for identifying each step that global positioning systems (GPS) follow to give an accurate location, up to maximum of [4].
\n
a.ii.
\n
\n
Answers may include:
\n
Reasons for sharing his personal health information:
\n
\n- The university may have access to data analytics tools that can interrogate his personal health information and give him feedback on his health/fitness.
\n- The university may be able to provide additional health-related information.
\n- The university may be able to analyse Jaime’s data against other and/or larger data sets.
\n- Jaime may accept that his data is “out there” already so there is no harm in re-sharing it (values).
\n- Jaime may wish to contribute towards research at the University of Sierra Nevada (values).
\n
\n
Reasons for not sharing his personal health information:
\n
\n- There may be no way of knowing which other third parties the university is sharing Jaime’s data with (values, systems).
\n- The university may impose conditions that may mean the data is not used for the purposes it was intended (values).
\n- Once the data is shared, it is hard to guarantee that it is deleted when it is no longer needed (values).
\n- Patient privacy is a concern. Is data anonymized and does the university have sufficient security measures in place?
\n- The sharing of Jaime’s data may have unintentional consequences (systems, accountability).
\n
\n
\n
Keywords: health, data, security, trust, values, ethics, security, anonymity, privacy, change, systems, values, ethics, accountability
\n
b.
\n
\n
Answers may include:
\n
Reasons why citizens like Jaime should only rely on the recommendations of the health app:
\n
\n- The health app may be more consistent in its advice than a human doctor (systems).
\n- The health app will not be influenced by the patient during the consultation / will be completely objective (systems).
\n- The health app may lead to savings (for the user of the app) so that other treatments that are currently not available may become possible as money is freed up / health app may be more cost-effective for the user than visiting a specialist.
\n- The health app is available 24/7 (systems).
\n- It is convenient, the app is available immediately, and Jaime would not have to visit a doctor or sports scientist to get advice (systems).
\n- The information from the app is available immediately without any delays (systems).
\n- The health app can be updated almost instantaneously, whereas doctors would have to attend courses to ensure new procedures, etc., are explained (systems).
\n- The app is available in any location so could, e.g., be used on holiday and the information and advice would still be available (systems, ubiquity).
\n
\n
Reasons why citizens like Jaime should not rely only on the recommendations of the health app:
\n
\n- The health app may be based on a generic profile and not have sufficient background data to make a more meaningful diagnosis than a human.
\n- The users may not trust the health app due to reliability and integrity issues.
\n- The quality of the data being collected may be poor and the advice might not be reliable.
\n- Negative results/unreliability could result in anxiety or cause Jaime to overexert himself in order to follow the advice of the app.
\n- Jaime may trust his judgement more than the app.
\n
\n
\n
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
\n
Keywords: health, data, trust, judgement, values, ethics, anonymity, privacy, monitoring, algorithm, change, systems, power, values, ethics
\n
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the \"Your tests\" tab > supplemental materials > Digital society markbands and guidance document.
\n
c.
\n
",
"Examiners report": "",
"question_id": "20N.1.SL.TZ0.3",
"topics": [
"topic-3-content",
"topic-2-concepts"
],
"subtopics": [
"3-1-data",
"3-2-algorithms",
"2-1-change"
]
}
]