Practice 3.4 Networks and the internet with authentic IB Digital Society (DS) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like systems and structures, human behavior and interaction, and digital technologies in society. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
Cloud networks allow for data storage and access over the internet, making data accessible from anywhere. This accessibility supports remote work, file sharing, and collaboration but also raises concerns about data security and control over personal information.
Evaluate the impact of cloud networks on data accessibility, considering the benefits for remote work and the potential security risks.
Firewalls are critical for network security, acting as barriers between internal networks and external threats. They control incoming and outgoing traffic, protecting against unauthorized access and cyber attacks. However, configuring firewalls effectively can be challenging, especially in large organizations.
Evaluate the role of firewalls in securing organizational networks, considering their effectiveness and potential challenges in implementation.
Malicious software (malware) is a significant threat to users of personal devices, as it can steal sensitive information, disrupt services, or even cause financial losses. With increased connectivity, devices are more vulnerable to these attacks, raising ethical questions about responsibility in cybersecurity.
Evaluate the ethical responsibilities of software developers and users in preventing the spread of malicious software on personal devices.
On 23 December 2011, an e-card with the subject ‘Merry Christmas!’ was supposedly sent by the US President’s office (from ‘jeff.jones@whitehouse.org’) to a massive number of recipients. Recipients who clicked to download and open the card (a .zip file) saw an animated Christmas tree while a trojan virus accessed their saved documents and passwords, and uploaded them to a server in Belarus.
Outline four steps in the process of how victims opening the e-card resulted in their files being uploaded to servers in Belarus.
In response to the news about the e-card trojan virus, some employees decided to search for, download and install FREE email protection software for their work computers instead of waiting for instructions from their employer. Evaluate this decision.
Computing networks enable connectivity across different scales and purposes, from Local Area Networks (LANs) within buildings to Wide Area Networks (WANs) spanning cities. Virtual Private Networks (VPNs) enhance security, while Client-Server and Peer-to-Peer (P2P) architectures support various communication methods.
For instance, a VPN can secure remote employee access to a company’s intranet, and LANs connect devices within a corporate office to share resources efficiently.
The effectiveness of networks depends on critical components such as clients, servers, routers, and switches. Modems connect devices to the internet, while network interfaces enable devices to join a network. These elements, together with wired and wireless media, make data transmission feasible across distances.
For example, a modem connects a home router to an internet service provider (ISP), enabling users to access the internet and local network resources.
Networks rely on transmission media for data transfer. Wired media (e.g., Ethernet and fiber-optic cables) provide high-speed, reliable connections, while wireless media (e.g., Wi-Fi and cellular networks) enable mobility. Each medium has specific advantages depending on the application.
For instance, fiber-optic cables support high-speed internet in metropolitan areas, while Wi-Fi enables device connectivity within homes and offices without physical cabling.
Protocols define communication standards for data exchange across networks. TCP/IP is foundational for the internet, while HTTP supports web browsing. Protocols like FTP and SMTP enable file transfers and email communication, respectively.
For example, TCP/IP underpins internet connections, ensuring data packets are transmitted between devices without data loss, even over long distances.
With reference to Source A, identify two types of computing networks and describe one specific application for each.
With reference to Source B, explain the roles of a modem and a network interface in enabling network connectivity.
With reference to Source C, outline one advantage of using wired media and one advantage of using wireless media in networks.
With reference to Source D, describe the function of the TCP/IP protocol in network communication.
With reference to Sources A–D and your own knowledge, discuss how network types, components, and protocols facilitate efficient data communication across different environments. Provide examples to support your answer.
Digital currency
Bitcoin is a type of digital currency (cryptocurrency). This is money that can be sent via the internet and exchanged for goods, services, or money in different currencies. Users can buy bitcoins using real money, and bitcoins can either be spent or stored in a digital wallet for later use. Bitcoins can be used in every country, and sending bitcoins is as simple as sending an email.
A bitcoin wallet is an application that can be installed on a computer or mobile device. Once a bitcoin wallet is installed, the user will get a bitcoin address to use when transferring bitcoins to and from the wallet. This transfer uses private and public key encryption. Users should have a strong password to access their bitcoin wallet.
Bitcoin operates on a peer-to-peer (P2P) network, and users of bitcoins are identified by their bitcoin address. Some users of bitcoins wish to remain anonymous, but this is not always possible.
Identify two characteristics of a peer-to-peer (P2P) network.
Identify two characteristics of a strong password.
The use of a password is one method of authentication.
Identify two other methods of authentication.
Explain one reason why bitcoin makes use of encryption when transmitting data.
Explain one reason why it may be difficult to ensure the security of information in a large peer-to-peer network such as bitcoin.
Some users of bitcoins are concerned that their anonymity may be compromised by their bitcoin address.
Explain one way in which a bitcoin address may be used to reveal information about a bitcoin user.
Bitcoin transactions are made between individuals without the knowledge of banks, governments, or credit card companies. Some governments are investigating whether they should regulate digital transactions, such as those made using bitcoins.
To what extent is it appropriate for governments to regulate digital transactions, such as those made using bitcoins?
Network characteristics such as bandwidth, security, and interoperability impact the efficiency and reliability of data exchange. For example, secure communication protocols like HTTPS help protect data during online transactions, while high bandwidth enables faster data transfers, which is crucial for activities like video streaming and online gaming.
Define the term ‘bandwidth’ and its importance in network performance.
Outline the role of encryption in securing network data transmission.
Explain how interoperability ensures that different devices and systems can communicate on a network.
Evaluate the importance of security measures, such as firewalls and VPNs, in protecting networks from cyber threats.
Voice simulation
Lyrebird voice-cloning software was created by three university students from Montreal. This technology was originally developed to change the lives of people who have lost their voice. These people can use the software to create a new voice by choosing one from samples provided in the software.
However, Lyrebird can also clone voices. Lyrebird claims that it can clone a person’s voice in just 60 seconds. Users only need to access the website, create an account, and generate a voice print by repeating a number of predetermined sentences. Although the cloning is not perfect, the developers of Lyrebird believe that both the time to clone the voice and the quality of the cloning will improve in the future.
The software allows the user to alter the speech and add emotion (such as, anger, elation, and surprise), increasing the ways in which it can be used.
The initial voice print for the cloning process requires the most time and a lot of processing power. However, creating speech from the voice print is a simple process, generating around 1000 sentences almost instantly. The voice print is saved as a compressed audio file.
Lyrebird has considered the ethical issues regarding biometrics* and acknowledges that it highlights some key societal issues. Lyrebird has taken the decision to make the software available to all in an attempt to address these issues.
* biometrics: a means of personal identification through analysis of unique physical traits or behavioural characteristics (for example, through voice patterns or fingerprints)
Lyrebird uses a person’s voice print to determine their identity.
Identify three other methods of biometric identification that could be used to determine a person’s identity.
A person’s voice print can be compressed.
Identify three problems that may result from compressing the voice print.
To what extent do the benefits of using Lyrebird’s voice-cloning software outweigh the concerns that may arise from its use?
Analysewhether it would be appropriate for Lyrebird to release the biometric data of a user to a third party.
Discuss how citizens could be impacted through the use of smart city digital technologies
Source A
Source B Through this article today, we are here to share with you the various challenges in the internet of things. Security challenges- The first and foremost on the list of challenges is security. As the backbone of IoT is data storage and sharing, the biggest question arises about the security of data. Enabling every small physical object with the feature of sharing information may attract multiple raised brows. Lack of encryption- Encryption sounds like the ultimate answer to security issues. But hackers may manipulate these algorithms and turn a protective system into the most serious loophole. Lack of sufficient testing and updating- With the increasing market of IoT, production has to be faster. To compete in the race of production, manufacturers lack tests and updates. The main focus of IoT manufacturers now seems to be production, not security. Thus products lack proper and regular testing and updates. This makes IOTs prone to being attacked by hackers.
Source C A smart home is a household with internet-connected appliances you can remotely control using a tablet or smartphone. It uses smart devices such as smart TVs, smart thermostats, air conditioners, and even a robot vacuum. They are then connected together in a single network, through either hardwired or wireless systems like Zigbee, Wi-Fi, Bluetooth, and NFC, among others. Using the Internet of Things (IoT) technology, your smart appliances can communicate and share real time data with each other. This allows the devices to perform scheduled and automated tasks. IoT home gadgets bounce data back and forth with the use of sensors, learning and processing your patterns to automatically adjust themselves to your comfort. Some smart home Internet of Things applications are automatic light switches, burglar alarms, and voice-activated sound systems.
Source D A tired business person returns to their certified IoT smart home after a long working week. The smart security system senses they are alone and initiates the “Friday Night In” sequence. An intercom with a thoughtful, comforting voice suggests they might want to order in tonight. The business person unloads their things in the kitchen where the smart stove displays a selection of take-outs, rather than its default recipe guide. After the food arrives they retreat to the living room to watch some TV. The smart TV prepares a selection of Netflix marathons categorized by mood. They choose: “Looking to be cheered up? Comedy Playlist.” Before starting the program, they review a set of graphs displaying the data from their activity and diet throughout the day. A list of tips for smart living is generated, one of which reads that based on the number of consecutive nights spent alone, they might consider exploring a selection of popular dating sites instead of watching TV. With an inadvertent slip of their thumb the request is OK’d and instantly a set of profiles are displayed, each chosen from a generated list of their tracked preferences. A flurry of pings and messages from other stay-at-home hopefuls fills the screen. The smart home intercom exclaims, “You’ve got mail!” The confused and beleaguered business person fumbles for the remote and… uh-oh, the TV snaps a selfie in response to the flood of pings. Their image, sitting in their underwear eating noodles appears briefly on the screen before being whisked off into the ether. The flood of messages doubles, the system freezes causing the smart home to reboot. The house goes dark.
With reference to Source A identify 2 positives of IoT.
With reference to Source B and one other real-world example you have studied, explain why it may be difficult to have IoT in smart homes.
Compare what Source C and Source D reveal about impacts of homeowners with IoT smart homes.
With reference to the sources and your own knowledge, discuss whether the use of IoT in smart homes is an incremental or transformational change.
Practice 3.4 Networks and the internet with authentic IB Digital Society (DS) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like systems and structures, human behavior and interaction, and digital technologies in society. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
Cloud networks allow for data storage and access over the internet, making data accessible from anywhere. This accessibility supports remote work, file sharing, and collaboration but also raises concerns about data security and control over personal information.
Evaluate the impact of cloud networks on data accessibility, considering the benefits for remote work and the potential security risks.
Firewalls are critical for network security, acting as barriers between internal networks and external threats. They control incoming and outgoing traffic, protecting against unauthorized access and cyber attacks. However, configuring firewalls effectively can be challenging, especially in large organizations.
Evaluate the role of firewalls in securing organizational networks, considering their effectiveness and potential challenges in implementation.
Malicious software (malware) is a significant threat to users of personal devices, as it can steal sensitive information, disrupt services, or even cause financial losses. With increased connectivity, devices are more vulnerable to these attacks, raising ethical questions about responsibility in cybersecurity.
Evaluate the ethical responsibilities of software developers and users in preventing the spread of malicious software on personal devices.
On 23 December 2011, an e-card with the subject ‘Merry Christmas!’ was supposedly sent by the US President’s office (from ‘jeff.jones@whitehouse.org’) to a massive number of recipients. Recipients who clicked to download and open the card (a .zip file) saw an animated Christmas tree while a trojan virus accessed their saved documents and passwords, and uploaded them to a server in Belarus.
Outline four steps in the process of how victims opening the e-card resulted in their files being uploaded to servers in Belarus.
In response to the news about the e-card trojan virus, some employees decided to search for, download and install FREE email protection software for their work computers instead of waiting for instructions from their employer. Evaluate this decision.
Computing networks enable connectivity across different scales and purposes, from Local Area Networks (LANs) within buildings to Wide Area Networks (WANs) spanning cities. Virtual Private Networks (VPNs) enhance security, while Client-Server and Peer-to-Peer (P2P) architectures support various communication methods.
For instance, a VPN can secure remote employee access to a company’s intranet, and LANs connect devices within a corporate office to share resources efficiently.
The effectiveness of networks depends on critical components such as clients, servers, routers, and switches. Modems connect devices to the internet, while network interfaces enable devices to join a network. These elements, together with wired and wireless media, make data transmission feasible across distances.
For example, a modem connects a home router to an internet service provider (ISP), enabling users to access the internet and local network resources.
Networks rely on transmission media for data transfer. Wired media (e.g., Ethernet and fiber-optic cables) provide high-speed, reliable connections, while wireless media (e.g., Wi-Fi and cellular networks) enable mobility. Each medium has specific advantages depending on the application.
For instance, fiber-optic cables support high-speed internet in metropolitan areas, while Wi-Fi enables device connectivity within homes and offices without physical cabling.
Protocols define communication standards for data exchange across networks. TCP/IP is foundational for the internet, while HTTP supports web browsing. Protocols like FTP and SMTP enable file transfers and email communication, respectively.
For example, TCP/IP underpins internet connections, ensuring data packets are transmitted between devices without data loss, even over long distances.
With reference to Source A, identify two types of computing networks and describe one specific application for each.
With reference to Source B, explain the roles of a modem and a network interface in enabling network connectivity.
With reference to Source C, outline one advantage of using wired media and one advantage of using wireless media in networks.
With reference to Source D, describe the function of the TCP/IP protocol in network communication.
With reference to Sources A–D and your own knowledge, discuss how network types, components, and protocols facilitate efficient data communication across different environments. Provide examples to support your answer.
Digital currency
Bitcoin is a type of digital currency (cryptocurrency). This is money that can be sent via the internet and exchanged for goods, services, or money in different currencies. Users can buy bitcoins using real money, and bitcoins can either be spent or stored in a digital wallet for later use. Bitcoins can be used in every country, and sending bitcoins is as simple as sending an email.
A bitcoin wallet is an application that can be installed on a computer or mobile device. Once a bitcoin wallet is installed, the user will get a bitcoin address to use when transferring bitcoins to and from the wallet. This transfer uses private and public key encryption. Users should have a strong password to access their bitcoin wallet.
Bitcoin operates on a peer-to-peer (P2P) network, and users of bitcoins are identified by their bitcoin address. Some users of bitcoins wish to remain anonymous, but this is not always possible.
Identify two characteristics of a peer-to-peer (P2P) network.
Identify two characteristics of a strong password.
The use of a password is one method of authentication.
Identify two other methods of authentication.
Explain one reason why bitcoin makes use of encryption when transmitting data.
Explain one reason why it may be difficult to ensure the security of information in a large peer-to-peer network such as bitcoin.
Some users of bitcoins are concerned that their anonymity may be compromised by their bitcoin address.
Explain one way in which a bitcoin address may be used to reveal information about a bitcoin user.
Bitcoin transactions are made between individuals without the knowledge of banks, governments, or credit card companies. Some governments are investigating whether they should regulate digital transactions, such as those made using bitcoins.
To what extent is it appropriate for governments to regulate digital transactions, such as those made using bitcoins?
Network characteristics such as bandwidth, security, and interoperability impact the efficiency and reliability of data exchange. For example, secure communication protocols like HTTPS help protect data during online transactions, while high bandwidth enables faster data transfers, which is crucial for activities like video streaming and online gaming.
Define the term ‘bandwidth’ and its importance in network performance.
Outline the role of encryption in securing network data transmission.
Explain how interoperability ensures that different devices and systems can communicate on a network.
Evaluate the importance of security measures, such as firewalls and VPNs, in protecting networks from cyber threats.
Voice simulation
Lyrebird voice-cloning software was created by three university students from Montreal. This technology was originally developed to change the lives of people who have lost their voice. These people can use the software to create a new voice by choosing one from samples provided in the software.
However, Lyrebird can also clone voices. Lyrebird claims that it can clone a person’s voice in just 60 seconds. Users only need to access the website, create an account, and generate a voice print by repeating a number of predetermined sentences. Although the cloning is not perfect, the developers of Lyrebird believe that both the time to clone the voice and the quality of the cloning will improve in the future.
The software allows the user to alter the speech and add emotion (such as, anger, elation, and surprise), increasing the ways in which it can be used.
The initial voice print for the cloning process requires the most time and a lot of processing power. However, creating speech from the voice print is a simple process, generating around 1000 sentences almost instantly. The voice print is saved as a compressed audio file.
Lyrebird has considered the ethical issues regarding biometrics* and acknowledges that it highlights some key societal issues. Lyrebird has taken the decision to make the software available to all in an attempt to address these issues.
* biometrics: a means of personal identification through analysis of unique physical traits or behavioural characteristics (for example, through voice patterns or fingerprints)
Lyrebird uses a person’s voice print to determine their identity.
Identify three other methods of biometric identification that could be used to determine a person’s identity.
A person’s voice print can be compressed.
Identify three problems that may result from compressing the voice print.
To what extent do the benefits of using Lyrebird’s voice-cloning software outweigh the concerns that may arise from its use?
Analysewhether it would be appropriate for Lyrebird to release the biometric data of a user to a third party.
Discuss how citizens could be impacted through the use of smart city digital technologies
Source A
Source B Through this article today, we are here to share with you the various challenges in the internet of things. Security challenges- The first and foremost on the list of challenges is security. As the backbone of IoT is data storage and sharing, the biggest question arises about the security of data. Enabling every small physical object with the feature of sharing information may attract multiple raised brows. Lack of encryption- Encryption sounds like the ultimate answer to security issues. But hackers may manipulate these algorithms and turn a protective system into the most serious loophole. Lack of sufficient testing and updating- With the increasing market of IoT, production has to be faster. To compete in the race of production, manufacturers lack tests and updates. The main focus of IoT manufacturers now seems to be production, not security. Thus products lack proper and regular testing and updates. This makes IOTs prone to being attacked by hackers.
Source C A smart home is a household with internet-connected appliances you can remotely control using a tablet or smartphone. It uses smart devices such as smart TVs, smart thermostats, air conditioners, and even a robot vacuum. They are then connected together in a single network, through either hardwired or wireless systems like Zigbee, Wi-Fi, Bluetooth, and NFC, among others. Using the Internet of Things (IoT) technology, your smart appliances can communicate and share real time data with each other. This allows the devices to perform scheduled and automated tasks. IoT home gadgets bounce data back and forth with the use of sensors, learning and processing your patterns to automatically adjust themselves to your comfort. Some smart home Internet of Things applications are automatic light switches, burglar alarms, and voice-activated sound systems.
Source D A tired business person returns to their certified IoT smart home after a long working week. The smart security system senses they are alone and initiates the “Friday Night In” sequence. An intercom with a thoughtful, comforting voice suggests they might want to order in tonight. The business person unloads their things in the kitchen where the smart stove displays a selection of take-outs, rather than its default recipe guide. After the food arrives they retreat to the living room to watch some TV. The smart TV prepares a selection of Netflix marathons categorized by mood. They choose: “Looking to be cheered up? Comedy Playlist.” Before starting the program, they review a set of graphs displaying the data from their activity and diet throughout the day. A list of tips for smart living is generated, one of which reads that based on the number of consecutive nights spent alone, they might consider exploring a selection of popular dating sites instead of watching TV. With an inadvertent slip of their thumb the request is OK’d and instantly a set of profiles are displayed, each chosen from a generated list of their tracked preferences. A flurry of pings and messages from other stay-at-home hopefuls fills the screen. The smart home intercom exclaims, “You’ve got mail!” The confused and beleaguered business person fumbles for the remote and… uh-oh, the TV snaps a selfie in response to the flood of pings. Their image, sitting in their underwear eating noodles appears briefly on the screen before being whisked off into the ether. The flood of messages doubles, the system freezes causing the smart home to reboot. The house goes dark.
With reference to Source A identify 2 positives of IoT.
With reference to Source B and one other real-world example you have studied, explain why it may be difficult to have IoT in smart homes.
Compare what Source C and Source D reveal about impacts of homeowners with IoT smart homes.
With reference to the sources and your own knowledge, discuss whether the use of IoT in smart homes is an incremental or transformational change.