Practice 2.5 Space with authentic IB Digital Society (DS) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like systems and structures, human behavior and interaction, and digital technologies in society. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
Source A
Source B (excerpt from NorthQuay Logistics website)
NorthQuay Logistics deployed WorkSight to standardize performance management across its warehouses and delivery fleet. In a staff email, leadership said WorkSight would “increase fairness by using consistent metrics” and “help identify training needs early.” The email also stated that monitoring would “reduce safety incidents by flagging fatigue and distraction” and “protect customers through stronger accountability.” Managers were encouraged to use the dashboard for coaching conversations and to document repeated low scores. Workers were told they could view their status in the WorkSight app, but that some data (such as comparison rankings and screenshot logs) would remain manager-only “to prevent gaming the system.” The company said data would not be sold, but it could be shared with contracted HR services for auditing and dispute resolution.
Source C (excerpt from WorkSight stats)
After WorkSight, recorded coaching meetings increased by 38%; written warnings increased by 16%.
61% of workers report checking their score multiple times per shift; 44% say it changes how often they take breaks.
Safety reports: minor incidents decreased by 9%, but near-miss reports decreased by 21% (workers cite “fear of being flagged”).
Turnover rose from 19% to 27% in monitored roles; exit interviews frequently mention “constant surveillance” and “no context.”
Managers report faster dispute handling, but workers report more account lockouts after automated “anomalous activity” flags.
Source D (commentary on WorkSight)
WorkSight is more than just a tool. It is a power arrangement disguised as “fairness.” NorthQuay says the metrics are consistent, but consistency is not the same as justice. When your job becomes a stream of captured signals (pings, screenshots, time stamps), management gains the authority to define what counts as “work” and what counts as “waste.” Meanwhile, workers get a simplified score band and motivational messages, not the full story of how they’re judged. That asymmetry matters. It makes contesting decisions harder and discipline easier. Even the language of “coaching” is slippery: the system produces more warnings, more pressure, and fewer moments where human context can override the dashboard. If safety is truly the goal, why do near-miss reports fall? People stop reporting when reporting feels risky. Power in a digital society often works like this: not by loud commands, but by quiet measurement that changes behaviour. The workplace becomes a monitored space where compliance is built into the interface.
Identify two types of worker data that WorkSight collects, as shown in Source A.
Explain how NorthQuay’s stated goals in Source B could increase managerial power over workers.
Compare and contrast how Source C and Source D portray the consequences of WorkSight for workers.
Discuss whether systems like WorkSight mainly improve accountability or mainly reinforce unequal power in workplaces. With reference to all the sources (A–D) and your own knowledge of the Digital Society course, consider structural power, information asymmetry, consent, and the potential for intended and unintended consequences.
Cloud networks allow for data storage and access over the internet, making data accessible from anywhere. This accessibility supports remote work, file sharing, and collaboration but also raises concerns about data security and control over personal information.
Evaluate the impact of cloud networks on data accessibility, considering the benefits for remote work and the potential security risks.
Drones are widely used for surveillance in law enforcement and border control. While they enhance monitoring capabilities and can improve public safety, drones also raise concerns about privacy, consent, and the potential misuse of surveillance technology in public and private spaces.
Discuss the impact of drone technology on public surveillance and privacy, considering both the benefits for security and the ethical implications for individual privacy rights.
Firewalls are critical for network security, acting as barriers between internal networks and external threats. They control incoming and outgoing traffic, protecting against unauthorized access and cyber attacks. However, configuring firewalls effectively can be challenging, especially in large organizations.
Evaluate the role of firewalls in securing organizational networks, considering their effectiveness and potential challenges in implementation.
Malicious software (malware) is a significant threat to users of personal devices, as it can steal sensitive information, disrupt services, or even cause financial losses. With increased connectivity, devices are more vulnerable to these attacks, raising ethical questions about responsibility in cybersecurity.
Evaluate the ethical responsibilities of software developers and users in preventing the spread of malicious software on personal devices.
Moore’s Law has driven rapid advancements in technology by predicting that the number of transistors on a chip doubles approximately every two years. This trend has influenced the affordability, size, and power of devices like smartphones and laptops, though some predict Moore’s Law may be slowing down.
Discuss the significance of Moore’s Law in shaping the development of personal computing devices, including potential consequences if the law’s trend no longer holds true.
Discuss the decision for an owner of an art gallery to develop a virtual tour that is accessible online.
Facial recognition algorithms, used for security in airports, rely on large datasets and are sometimes criticized for algorithmic bias. For instance, these algorithms have been known to misidentify individuals of certain racial backgrounds, raising fairness and transparency issues.
Identify two issues related to algorithmic bias in facial recognition software.
Explain why transparency is essential for accountability in facial recognition algorithms used in security.
Discuss one risk associated with “black box” algorithms in facial recognition systems.
Evaluate the impact of algorithmic bias on fairness in facial recognition, particularly concerning racial and ethnic disparities.
Source A
Source B (excerpt from Riverlight Festival history article)
FlowMap is Riverlight Festival’s official navigation and crowd-information app. It provides live route suggestions, estimated walking times, and alerts when zones approach capacity. For safety, the festival introduced a geofenced area in Old Town Streets: after 19:00, entry requires a valid digital pass displayed in the app or scanned from a printed QR code. The city says the geofence allows emergency services to keep streets passable and prevents dangerous overcrowding. Vendors can post location-based offers to nearby users, and stage managers can send push notifications to redirect visitors to less busy areas. The app stores location pings during the festival to generate a post-event “flow report.”
Source C (excerpt from FlowMap stats)
During peak hours, FlowMap rerouting reduced average time spent in the most crowded corridor by 14 minutes per person (estimated from app pings).
29% of attendees did not install FlowMap; among them, reports of “confusing signage” were twice as common.
At Old Town’s geofenced checkpoints, average queue time was 4 minutes, but rose to 18 minutes during one network slowdown.
Local businesses outside the main zones report a 12% increase in footfall after push-notification reroutes.
8% of help-desk requests related to access involved “phone battery died” or “no signal to load pass.”
Source D (opinion article)
FlowMap is sold as a neutral layer of “information,” but it changes what public space means. The city used to manage the festival with barriers, signage, and staff - visible tools that anyone could understand. Now, access depends on whether your phone can load a pass at the right moment. A geofence is not just a circle on a map; it is a digital boundary that can be tightened, expanded, or activated without the same public visibility as a physical gate.
Supporters point to safety and faster movement, yet the system also creates new choke points: queues caused by network slowdown, dead batteries, and confusion for those without the app. Even the rerouting is political. Who decides which neighbourhoods become “overflow” spaces, and who benefits from location-based offers? When movement is guided by push notifications, the festival becomes a managed flow rather than a shared place. Digital space and physical space are now co-produced, and that should raise questions about fairness, access, and whose experience the city is optimizing.
Define the term geofenced as it is used in Source B.
Analyse what Source C suggests about how FlowMap changes movement and access at Riverlight Festival.
Compare and contrast what Source C and Source D imply about whether FlowMap makes festival space more inclusive.
Examine whether digital systems like FlowMap improve the management of public space more than they undermine it. With reference to all the sources (A–D) and your own knowledge of the Digital Society course, consider representations of space, flows of people, and the role of infrastructure.
Data storage (like hard drives and SSDs) holds files permanently, while memory (RAM) stores temporary data, supporting the computer’s processing needs. Effective storage and memory are critical to speed and multitasking abilities in devices from smartphones to mainframes.
For example, an SSD in a laptop allows fast data retrieval, boosting performance for tasks like video editing and gaming.
Wearable computers, such as smartwatches and fitness trackers, integrate technology into daily life, providing health monitoring, communication, and real-time data tracking. These devices are lightweight and adaptable, making them practical for continuous use.
For instance, a smartwatch can monitor heart rate, track physical activity, and send alerts, helping users maintain their health goals.
Moore’s Law states that the number of transistors in a microchip doubles approximately every two years, boosting processing power. This principle has driven computing advancements, leading to smaller, faster, and more efficient devices.
For example, Moore’s Law facilitated the evolution from bulky desktop computers to powerful smartphones that fit in a pocket.
User interfaces (UIs) allow people to interact with computers. Graphical user interfaces (GUIs) use icons and visuals to make navigation intuitive, while haptic interfaces provide touch feedback, enhancing the tactile experience in applications like gaming and virtual reality.
For example, smartphones combine haptic feedback with touchscreens, making interactions more intuitive for users.
With reference to Source A, explain the difference between data storage and memory, including one example of each.
With reference to Source B, describe two ways wearable devices integrate technology into daily life.
With reference to Source C, outline the impact of Moore’s Law on the evolution of computing devices.
With reference to Source D, identify two types of user interfaces and describe their functions in enhancing user interaction.
With reference to Sources A–D and your own knowledge, discuss the implications of technological advancements in computing on user experience and lifestyle. Include examples of at least two advancements.
Practice 2.5 Space with authentic IB Digital Society (DS) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like systems and structures, human behavior and interaction, and digital technologies in society. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
Source A
Source B (excerpt from NorthQuay Logistics website)
NorthQuay Logistics deployed WorkSight to standardize performance management across its warehouses and delivery fleet. In a staff email, leadership said WorkSight would “increase fairness by using consistent metrics” and “help identify training needs early.” The email also stated that monitoring would “reduce safety incidents by flagging fatigue and distraction” and “protect customers through stronger accountability.” Managers were encouraged to use the dashboard for coaching conversations and to document repeated low scores. Workers were told they could view their status in the WorkSight app, but that some data (such as comparison rankings and screenshot logs) would remain manager-only “to prevent gaming the system.” The company said data would not be sold, but it could be shared with contracted HR services for auditing and dispute resolution.
Source C (excerpt from WorkSight stats)
After WorkSight, recorded coaching meetings increased by 38%; written warnings increased by 16%.
61% of workers report checking their score multiple times per shift; 44% say it changes how often they take breaks.
Safety reports: minor incidents decreased by 9%, but near-miss reports decreased by 21% (workers cite “fear of being flagged”).
Turnover rose from 19% to 27% in monitored roles; exit interviews frequently mention “constant surveillance” and “no context.”
Managers report faster dispute handling, but workers report more account lockouts after automated “anomalous activity” flags.
Source D (commentary on WorkSight)
WorkSight is more than just a tool. It is a power arrangement disguised as “fairness.” NorthQuay says the metrics are consistent, but consistency is not the same as justice. When your job becomes a stream of captured signals (pings, screenshots, time stamps), management gains the authority to define what counts as “work” and what counts as “waste.” Meanwhile, workers get a simplified score band and motivational messages, not the full story of how they’re judged. That asymmetry matters. It makes contesting decisions harder and discipline easier. Even the language of “coaching” is slippery: the system produces more warnings, more pressure, and fewer moments where human context can override the dashboard. If safety is truly the goal, why do near-miss reports fall? People stop reporting when reporting feels risky. Power in a digital society often works like this: not by loud commands, but by quiet measurement that changes behaviour. The workplace becomes a monitored space where compliance is built into the interface.
Identify two types of worker data that WorkSight collects, as shown in Source A.
Explain how NorthQuay’s stated goals in Source B could increase managerial power over workers.
Compare and contrast how Source C and Source D portray the consequences of WorkSight for workers.
Discuss whether systems like WorkSight mainly improve accountability or mainly reinforce unequal power in workplaces. With reference to all the sources (A–D) and your own knowledge of the Digital Society course, consider structural power, information asymmetry, consent, and the potential for intended and unintended consequences.
Cloud networks allow for data storage and access over the internet, making data accessible from anywhere. This accessibility supports remote work, file sharing, and collaboration but also raises concerns about data security and control over personal information.
Evaluate the impact of cloud networks on data accessibility, considering the benefits for remote work and the potential security risks.
Drones are widely used for surveillance in law enforcement and border control. While they enhance monitoring capabilities and can improve public safety, drones also raise concerns about privacy, consent, and the potential misuse of surveillance technology in public and private spaces.
Discuss the impact of drone technology on public surveillance and privacy, considering both the benefits for security and the ethical implications for individual privacy rights.
Firewalls are critical for network security, acting as barriers between internal networks and external threats. They control incoming and outgoing traffic, protecting against unauthorized access and cyber attacks. However, configuring firewalls effectively can be challenging, especially in large organizations.
Evaluate the role of firewalls in securing organizational networks, considering their effectiveness and potential challenges in implementation.
Malicious software (malware) is a significant threat to users of personal devices, as it can steal sensitive information, disrupt services, or even cause financial losses. With increased connectivity, devices are more vulnerable to these attacks, raising ethical questions about responsibility in cybersecurity.
Evaluate the ethical responsibilities of software developers and users in preventing the spread of malicious software on personal devices.
Moore’s Law has driven rapid advancements in technology by predicting that the number of transistors on a chip doubles approximately every two years. This trend has influenced the affordability, size, and power of devices like smartphones and laptops, though some predict Moore’s Law may be slowing down.
Discuss the significance of Moore’s Law in shaping the development of personal computing devices, including potential consequences if the law’s trend no longer holds true.
Discuss the decision for an owner of an art gallery to develop a virtual tour that is accessible online.
Facial recognition algorithms, used for security in airports, rely on large datasets and are sometimes criticized for algorithmic bias. For instance, these algorithms have been known to misidentify individuals of certain racial backgrounds, raising fairness and transparency issues.
Identify two issues related to algorithmic bias in facial recognition software.
Explain why transparency is essential for accountability in facial recognition algorithms used in security.
Discuss one risk associated with “black box” algorithms in facial recognition systems.
Evaluate the impact of algorithmic bias on fairness in facial recognition, particularly concerning racial and ethnic disparities.
Source A
Source B (excerpt from Riverlight Festival history article)
FlowMap is Riverlight Festival’s official navigation and crowd-information app. It provides live route suggestions, estimated walking times, and alerts when zones approach capacity. For safety, the festival introduced a geofenced area in Old Town Streets: after 19:00, entry requires a valid digital pass displayed in the app or scanned from a printed QR code. The city says the geofence allows emergency services to keep streets passable and prevents dangerous overcrowding. Vendors can post location-based offers to nearby users, and stage managers can send push notifications to redirect visitors to less busy areas. The app stores location pings during the festival to generate a post-event “flow report.”
Source C (excerpt from FlowMap stats)
During peak hours, FlowMap rerouting reduced average time spent in the most crowded corridor by 14 minutes per person (estimated from app pings).
29% of attendees did not install FlowMap; among them, reports of “confusing signage” were twice as common.
At Old Town’s geofenced checkpoints, average queue time was 4 minutes, but rose to 18 minutes during one network slowdown.
Local businesses outside the main zones report a 12% increase in footfall after push-notification reroutes.
8% of help-desk requests related to access involved “phone battery died” or “no signal to load pass.”
Source D (opinion article)
FlowMap is sold as a neutral layer of “information,” but it changes what public space means. The city used to manage the festival with barriers, signage, and staff - visible tools that anyone could understand. Now, access depends on whether your phone can load a pass at the right moment. A geofence is not just a circle on a map; it is a digital boundary that can be tightened, expanded, or activated without the same public visibility as a physical gate.
Supporters point to safety and faster movement, yet the system also creates new choke points: queues caused by network slowdown, dead batteries, and confusion for those without the app. Even the rerouting is political. Who decides which neighbourhoods become “overflow” spaces, and who benefits from location-based offers? When movement is guided by push notifications, the festival becomes a managed flow rather than a shared place. Digital space and physical space are now co-produced, and that should raise questions about fairness, access, and whose experience the city is optimizing.
Define the term geofenced as it is used in Source B.
Analyse what Source C suggests about how FlowMap changes movement and access at Riverlight Festival.
Compare and contrast what Source C and Source D imply about whether FlowMap makes festival space more inclusive.
Examine whether digital systems like FlowMap improve the management of public space more than they undermine it. With reference to all the sources (A–D) and your own knowledge of the Digital Society course, consider representations of space, flows of people, and the role of infrastructure.
Data storage (like hard drives and SSDs) holds files permanently, while memory (RAM) stores temporary data, supporting the computer’s processing needs. Effective storage and memory are critical to speed and multitasking abilities in devices from smartphones to mainframes.
For example, an SSD in a laptop allows fast data retrieval, boosting performance for tasks like video editing and gaming.
Wearable computers, such as smartwatches and fitness trackers, integrate technology into daily life, providing health monitoring, communication, and real-time data tracking. These devices are lightweight and adaptable, making them practical for continuous use.
For instance, a smartwatch can monitor heart rate, track physical activity, and send alerts, helping users maintain their health goals.
Moore’s Law states that the number of transistors in a microchip doubles approximately every two years, boosting processing power. This principle has driven computing advancements, leading to smaller, faster, and more efficient devices.
For example, Moore’s Law facilitated the evolution from bulky desktop computers to powerful smartphones that fit in a pocket.
User interfaces (UIs) allow people to interact with computers. Graphical user interfaces (GUIs) use icons and visuals to make navigation intuitive, while haptic interfaces provide touch feedback, enhancing the tactile experience in applications like gaming and virtual reality.
For example, smartphones combine haptic feedback with touchscreens, making interactions more intuitive for users.
With reference to Source A, explain the difference between data storage and memory, including one example of each.
With reference to Source B, describe two ways wearable devices integrate technology into daily life.
With reference to Source C, outline the impact of Moore’s Law on the evolution of computing devices.
With reference to Source D, identify two types of user interfaces and describe their functions in enhancing user interaction.
With reference to Sources A–D and your own knowledge, discuss the implications of technological advancements in computing on user experience and lifestyle. Include examples of at least two advancements.