DP Digital Society Questionbank
Topic 3: Content
Path: |
Description
[N/A]Directly related questions
-
21M.1.SL.TZ0.1a.ii:
A computer program uses data provided by a rain sensor to decide whether to water the trees. Identify three ways how the algorithm may be represented.
-
21M.1.SL.TZ0.1a.i:
Identify three characteristics of open-source software.
-
21M.1.SL.TZ0.1b:
Water is becoming increasingly scarce in Chacra Province, and the provincial government is concerned there will be a point when there is not enough water for all of the farms to water their crops or fruit trees.
To manage water for the watering of crops and fruit trees, the provincial government of Chacra Province intends to use computer modelling to calculate how much water each farm in the province will receive.
Explain three factors that will contribute to the accuracy of this computer model.
-
21M.1.SL.TZ0.4c:
King Robotics is planning to use social robots in schools. The robots will use a unique approach called care receiving. In this approach to teaching, the robot does not directly instruct the student; instead, the robot makes mistakes and asks the student for help to correct them. Early studies have found that children respond very positively to this approach. The robots will also be able to carry out direct teaching activities.
Evaluate the advantages and disadvantages of using social robots such as Pepper to support the care-receiving teaching approach as well as carry out direct teaching activities.
-
21M.1.HL.TZ0.5:
A cashless society
In the near future, it is possible that cash will not be accepted as a means of payment in Sweden. People are already using alternative ways of paying, such as mobile payment, card payment and internet payment. Currently, over 95% of citizens in Sweden have internet access.
Many people in Sweden claim there are advantages of using an app developed by Swish. The Swish app allows friends to share a restaurant bill, pay where credit or debit cards are not accepted, for babysitting or parking tickets, or make a donation at church.
However, other people in Sweden claim that making the Swish app the only means of payment may increase inequalities within the country.
Discuss whether countries should pass legislation making apps such as Swish the only means of payment.
-
21M.1.SL.TZ0.1c:
The farmers of Chacra Province are concerned about the provincial government using a computer model to determine the amount of water they will be allowed to use to water their fruit trees.
To what extent should the farmers of Chacra Province rely on their knowledge and experience, rather than the computer-based solution provided by the provincial government, to manage the watering of the fruit trees?
-
21M.1.SL.TZ0.2c:
Discuss whether Daniela should make every teacher at Orams Academy use the same learning platform or allow each teacher to choose their own preferred learning management approach.
-
21M.1.SL.TZ0.4b.ii:
Identify two disadvantages of using unsupervised learning to enable Pepper to improve its natural language processing.
-
21M.1.SL.TZ0.2a.ii:
Identify two reasons why there might be a lack of bandwidth at times on the school’s network.
-
21M.1.SL.TZ0.3a.ii:
A person’s voice print can be compressed.
Identify three problems that may result from compressing the voice print.
-
21M.1.SL.TZ0.4a.ii:
Outline two reasons why Pepper could not answer a customer’s question in a supermarket.
-
21M.1.SL.TZ0.2a.iii:
Identify two potential disadvantages of using online digital media.
-
21M.1.SL.TZ0.2b:
The increasing use of cloud-based applications and online collaborative tools has led to Orams Academy introducing an acceptable use policy for students and teachers.
Explain three reasons why Orams Academy decided to introduce an acceptable use policy.
-
21M.1.SL.TZ0.4a.i:
In addition to a voice sensor, identify two sensors that would be found in Pepper.
-
21M.1.SL.TZ0.4b.i:
Identify two advantages of using unsupervised learning to enable Pepper to improve its natural language processing.
-
21M.1.SL.TZ0.4b.iii:
Pepper is released in batches of a thousand, and they usually sell out immediately.
Explain one reason why Pepper is only released in relatively small batches.
-
21M.1.SL.TZ0.3c:
To what extent do the benefits of using Lyrebird’s voice-cloning software outweigh the concerns that may arise from its use?
-
21M.1.HL.TZ0.6:
Fake news
We see and hear news every day and trust that the information provided is accurate. That belief may soon end.
Artificial intelligence (AI) software is now being developed that can produce fake video footage of public figures using recordings of their own voices. Using as little as one minute of user-generated content (data), it can reproduce a particular person’s voice. The developer of this software demonstrated the results by using the voices of Bill Clinton, George Bush and Barack Obama in a computer-generated conversation.
Once a person’s voice has been reproduced, a fake video can be created by processing hundreds of videos of the person’s face. Video footage of politicians are often used, as there is so much data available online.
Law professor John Silverman commented that, as humans we tend to believe what we see, and the increased number of tools to make fake media that is unrecognizable from real media is going to prove a major challenge in the future.
Discuss the claim that companies who develop software that can create fake videos of politicians should be accountable for the fake videos posted by users of their software on social media platforms.
-
19N.1.SL.TZ0.1a.i:
Identify two other forms of biometric data Bright Creativa could collect.
-
19N.1.SL.TZ0.1a.ii:
Identify two characteristics of a relational database.
-
19N.1.SL.TZ0.1a.iii:
Identify two methods that could be used to ensure that the data input to the database is accurate.
-
19N.1.SL.TZ0.1b:
As part of the implementation of the biometric authorization system, Bright Creativa has written a privacy policy.
Explain three features that Bright Creativa would need to include in a privacy policy linked to the company’s biometric authorization system.
-
19N.1.SL.TZ0.3a.i:
Identify two ways how the TailorEd system could provide feedback to students.
-
19N.1.SL.TZ0.3a.ii:
Identify two ways how the data collected about students’ academic progress could be used by TailorEd.
-
21M.1.SL.TZ0.3a.i:
Lyrebird uses a person’s voice print to determine their identity.
Identify three other methods of biometric identification that could be used to determine a person’s identity.
-
19N.1.SL.TZ0.1c:
To what extent are the benefits of employees’ improved access to company resources outweighed by their concerns about the level of surveillance by the company?
-
19N.1.SL.TZ0.2a.i:
Identify two measurements that could be taken by the weather sensors in Kinakora National Park.
-
19N.1.SL.TZ0.3a.iii:
Outline how a firewall functions.
-
21M.1.SL.TZ0.3b:
Analyse whether it would be appropriate for Lyrebird to release the biometric data of a user to a third party.
-
19N.1.SL.TZ0.2c:
Evaluate Kinakora National Park’s decision to use computer modelling to develop strategies for dealing with wildfires.
-
19N.1.SL.TZ0.2a.iii:
Identify two methods of visualization that could be used to present information from the new computer modelling system.
-
19N.1.SL.TZ0.2b:
Two methods for informing tourists about wildfires in Kinakora National Park are:
- short message service (SMS) texting/text messaging
- posting information on the Kinakora National Park website.
Analyse these two methods.
-
19N.1.SL.TZ0.3b:
There are two possible methods for ensuring students use the TailorEd online learning system responsibly. They are:
- restricting access to sites that may be considered inappropriate
- educating the students about acceptable use.
Analyse these two methods.
-
19N.1.SL.TZ0.3c:
To what extent do the benefits of collecting students’ academic progress data outweigh the concerns of the students, teachers and parents?
-
19N.1.SL.TZ0.4a.i:
Identify two types of artificial intelligence (AI).
-
19N.1.SL.TZ0.4b.iii:
Identify two characteristics of deep learning.
-
19N.1.SL.TZ0.4a.ii:
Identify two types of machine learning.
-
19N.1.SL.TZ0.4a.iii:
Outline how pattern recognition works.
-
19N.1.SL.TZ0.4b.i:
Identify two advantages of using artificial neural networks (ANNs).
-
19N.1.SL.TZ0.4b.ii:
Identify two disadvantages of using artificial neural networks (ANNs).
-
19N.1.SL.TZ0.4c:
To what extent should pattern recognition in AI systems be trusted to make decisions about sending real-time alerts to the police?
-
19N.1.HL.TZ0.5:
Sharing dashcam* footage with police
Many police departments have started campaigns to encourage members of the public to upload footage of possible offences committed by drivers to police websites. The police are looking for footage of activities such as dangerous driving and driving whilst talking on a cellphone/mobile phone.
Members of the public can create an account on the police website to upload footage from their dashcam (see Figure 3). They can also upload their dashcam footage anonymously.
The police claim that using dashcam footage uploaded by the public will help reduce the number of accidents caused by dangerous driving.
Figure 3: An example of a dashcam
* dashcam: a video camera mounted in a vehicle to record activity on roads
Discuss whether this dashcam footage should be used by the police as part of their strategy to reduce the number of accidents caused by dangerous driving. -
19N.1.HL.TZ0.6:
Automated medical image analysis
EBBZS IT, based in Groningen, the Netherlands, intends to develop a system using artificial intelligence (AI) to help doctors at Joelstraat Hospital interpret medical images.
Due to the high resolution* of the digital images (see Figure 4), EBBZS IT claims the AI system will be able to learn from these images to assist doctors when diagnosing patients’ illnesses.
EBBZS IT also claims the AI system will be able to cope with the significant increase in the volume of patients and the increased complexity of their symptoms and conditions.
Figure 4: Examples of digital images used in the AI system
[National Institutes of Health: https://commons.wikimedia.org/wiki/File:
Human_ brain_development_1wk-3mo-1yr-2yr-10yr-T1W-MRI.PNG]
* resolution: the detail an image holds. It can be measured in pixels per centimetre.
Discuss the claim by EBBZS IT that the diagnosis of patients’ illnesses should be based on the information provided by the AI system. -
18N.1.SL.TZ0.3b.i:
Explain why each image has its resolution reduced before it is uploaded to ACP’s website.
-
20N.1.SL.TZ0.1a.i:
Describe two features of the user interface in Figure 1 that make it intuitive.
-
20N.1.SL.TZ0.1a.ii:
Outline one advantage of using a relational database to store this data.
- 20N.1.SL.TZ0.1b: A number of individuals and groups were consulted during the design of the e-voting system to...
-
20N.1.SL.TZ0.1c:
Some states are planning to return to a paper-based voting system, where voters put a cross (X) in the column next to the party of their choice.
Discuss whether these states should retain e-voting or return to a paper-based voting system.
-
20N.1.SL.TZ0.2a.i:
Identify two pieces of information that would be used to identify a device on the IT network.
-
20N.1.SL.TZ0.2a.ii:
Identify the steps used by speech-to-text software.
-
20N.1.SL.TZ0.4a.iii:
Identify two types of machine learning used by artificial intelligence (AI) systems.
-
20N.1.SL.TZ0.3a.i:
Identify two vital signs that can be recorded by Jaime’s sports watch.
- 20N.1.SL.TZ0.2b: Digital citizenship is included in Xingu Academy’s IT acceptable use policy. Explain why it is...
-
20N.1.SL.TZ0.3b:
Jaime has decided to share his personal health information with researchers at the University of Sierra Nevada.
Analyse Jaime’s decision to share his personal health information with the University of Sierra Nevada.
-
20N.1.SL.TZ0.4a.ii:
Identify two sensors that the passenger’s bracelet may use.
-
20N.1.SL.TZ0.4b.i:
Explain why the avatar developers would create avatars that do not look like humans.
-
20N.1.SL.TZ0.2c:
Discuss whether Xingu Academy should become a bring-your-own-device (BYOD) school.
-
20N.1.SL.TZ0.3a.ii:
Identify the steps that the GPS receiver in Jaime’s sports watch uses to show the routes of his training runs.
-
20N.1.SL.TZ0.3c:
The development of mobile health apps has changed the way citizens manage their own health and well-being.
Discuss whether citizens like Jaime should rely only on the advice of a health app to manage their own health and well-being.
-
20N.1.SL.TZ0.4b.ii:
Explain why George believes the avatar developers should observe the passengers’ real-time interactions with the system.
-
20N.1.SL.TZ0.4c:
Matt Earle, the CEO of SBE Cruise Lines, has been investigating using artificial intelligence (AI) systems to track passengers and suggest activities they may wish to take part in when they interact with the touch screens on the ship. Some of his colleagues have concerns about taking this approach.
To what extent should Matt rely on the recommendations from the AI system to suggest activities to passengers?
-
20N.1.HL.TZ0.5:
Clouds under the sea
Microsoft has located one of its data centres on the seabed. Project Natick is now operating 100 feet below the surface of the North Sea (see Figure 4).
Figure 4: An artist’s representation of a data centre on the sea bed
[Adapted under sea photo by NOAA on Unsplash]
Microsoft has chosen to develop data centres on the seabed because they claim there are concerns about the environmental impact of data centres built on land. These seabed data centres can be constructed and placed on the sea bed in 90 days. This is compared to the two years that are required for land-based data centres.
Google patented their design for an underwater data centre in 2009. Even though functioning prototypes have been trialled, none have been used commercially.
The demand for data storage is doubling every two years, so it is likely that an increasing number of data centres will need to be constructed. These data centres can be constructed either under the sea or on land.
Discuss whether companies like Microsoft should build data centres on the seabed.
-
21N.1.SL.TZ0.1a.i:
Identify two hardware devices that Rajesh could use to view his internet protocol television (IPTV) channels.
-
21N.1.SL.TZ0.1a.ii:
Identify two features of a virtual private network (VPN).
- 21N.1.SL.TZ0.1b.i: Explain why Rajesh downloaded films rather than streaming them when he was travelling.
-
21N.1.SL.TZ0.2b:
Analyse the decision by some airports to attach radio frequency identification (RFID) tags to luggage when it is checked in by the passenger, instead of barcode paper printed tags.
-
21N.1.SL.TZ0.3b:
MediResearch is looking to expand access to the genome data it holds by sharing it with other companies.
Explain three strategies that MediResearch could use to ensure the security of the genome data.
-
21N.1.SL.TZ0.1a.iii:
Identify two features of a protocol.
-
21N.1.SL.TZ0.1b.ii:
Rajesh has been told that subscribing to an internet protocol television (IPTV) service may compromise his anonymity.
Distinguish between anonymity and privacy.
-
21N.1.SL.TZ0.1c:
To what extent is it acceptable for Rajesh to use services like a virtual private network (VPN) to access content that may be blocked in the country he is visiting?
-
21N.1.SL.TZ0.4a.i:
Identify two characteristics of pattern recognition.
-
21N.1.SL.TZ0.4b:
Scientists used visualizations, such as in Figure 4, to present the information about predicted earthquake activity.
Analyse the decision to use visualizations.
-
21N.1.SL.TZ0.2a.i:
Identify two pieces of information about the luggage that may be obtained from this database.
-
21N.1.SL.TZ0.2a.ii:
Identify the steps taken by the luggage control system to decide which conveyor belt to choose when a bag reaches a junction between two conveyor belts.
-
21N.1.SL.TZ0.3a.i:
Identify two features of a relational database.
-
21N.1.SL.TZ0.2c:
Airlines have databases that contain data about passengers when tickets are booked. This data includes travel dates, itineraries, contact details, passport details and passengers’ home addresses. When passengers purchase a ticket online from an airline company, they have to accept the airline’s terms and conditions by clicking “Agree” (see Figure 3).
Figure 3: Acceptance of airline terms and conditions
Within these terms and conditions, it states that the airline may receive a request to share this data with the government of the country to which the passenger is flying.
Discuss whether airlines should share passengers’ data with the governments of the countries to which they are flying.
-
21N.1.SL.TZ0.3c:
The chief executive officer of MediResearch is considering using cloud-based storage to store the genome data.
Discuss whether MediResearch should move to cloud-based storage.
-
21N.1.SL.TZ0.4a.iii:
Identify two characteristics of an algorithm.
-
21N.1.SL.TZ0.3a.ii:
Identify two reasons why a relational database, rather than a flat-file database, is used to store the data for MediResearch.
-
21N.1.SL.TZ0.4a.ii:
Outline one reason why it might be difficult to collect accurate data that can be used for predicting earthquakes.
-
21N.1.SL.TZ0.4c:
Discuss the advantages and disadvantages of using machine learning to predict natural disasters like earthquakes.
-
21N.1.SL.TZ0.3a.iii:
Identify two features of data analytics.
-
21N.1.HL.TZ0.6:
Smart warehouse
Greenwood Industries’ warehouse uses a smart storage solution for the picking of products from the shelves of the warehouse. Robots are used in this automated picking process.
Currently, these robots are programmed to access a knowledge base* that enables these robots to use the most efficient route for the picking of products.
Greenwood Industries claims the picking process would be improved if the expert system was replaced by an artificial neural network (ANN).
Discuss whether Greenwood Industries should replace the existing system with one that uses an artificial neural network (ANN).
* knowledge base: a set of rules that are manually input into an expert system.
-
21N.1.HL.TZ0.5:
Smart farming
A government in East Africa is using the expertise of scientists at a university in the region to promote the culture of smart farming and increase the productivity of farmers (see Figure 5). To do this, they have developed an app that the farmers can use to assist them in their decision-making.
Figure 5: An example of farming in East Africa
[Palmer, N., 2010. A farmer at work in Kenya’s Mount Kenya region [image] [online] Available at: https://commons.wikimedia.org/wiki/File:2DU_Kenya_86_(5367322642).jpg (CC BY-SA 2.0) https://creativecommons.org/licenses/by-sa/2.0/deed.en [Accessed 18 May 2020].]
Unfortunately, the scientists who developed the app have received many complaints from farmers who have been unable to use it. They are considering two options:
- making the existing system more user-friendly
- educating the farmers to use the existing system.
The scientists claim by making changes to the app it will make the app more user-friendly for the farmers. However, the farmers claim it would be better to provide them with education, such as training, so they can use the existing app.
Evaluate these two claims.
-
19M.2.SL.TZ0.1:
In Source A, employees are using an embedded microchip to gain access to the building.
Identify two digital systems, in addition to implanted microchips, that an employee could use to gain access to a building in Source A.
-
19M.2.SL.TZ0.3:
Compare and contrast what Source C and Source D reveal about the implanting of microchips in humans.
-
19M.2.SL.TZ0.4:
To what extent do you agree that the advantages of implanting microchips in humans outweigh the concerns? Use all the sources and your own knowledge.
-
18M.2.SL.TZ0.1:
Identify two trends of social media usage that can be seen in Source A.
-
18M.2.SL.TZ0.3:
Compare and contrast the effectiveness of the approaches outlined in Source C and Source D towards the responsible use of mobile devices.
-
18M.3.HL.TZ0.1a:
Identify two characteristics of a social robot that will make it accepted by students.
-
18M.2.SL.TZ0.2:
Suggest two reasons why there has been a significant decrease in in-person communication with teenagers between 2013 and 2019 in Source B.
-
18M.2.SL.TZ0.4:
Mobile devices provide many benefits for children but can also be used inappropriately. Some groups claim it is the responsibility of parents to ensure their children use their mobile devices responsibly, while other groups claim that responsibility lies with other stakeholders, such as schools.
With reference to all the sources and your own knowledge, to what extent do you agree that parents should be responsible for ensuring their children develop safe and healthy habits for mobile device usage?
-
18M.3.HL.TZ0.1b:
Tayton School has 30 students with attention deficit hyperactivity disorder (ADHD).
Describe one assistive technology solution that could be used by these students.
-
18M.3.HL.TZ0.2a:
An assistive technology app and a social robot can help a student with the same lesson.
Explain one interactive feature of a social robot that will help a student with the same lesson that an app would not be able to do.
-
18M.3.HL.TZ0.2b:
Explain one action that needs to be taken by the school so that the students can benefit from any assisted technology that is purchased.
-
18M.3.HL.TZ0.4:
With reference to the stimulus material and your own inquiries, recommend whether Tayton School should use social robots and/or assistive technologies to ensure students with SEND can be further integrated into the school.
-
19M.3.HL.TZ0.1a:
Identify two ways how an autonomous vehicle can verify it is collecting the right passenger.
-
19M.3.HL.TZ0.1b:
Identify two characteristics of ride-sharing apps that have made them popular
-
19M.3.HL.TZ0.2b:
Explain why an autonomous vehicle may not choose the best route from Miketon to Towbro, the regional centre.
-
18M.3.HL.TZ0.3:
The students with special educational needs and disabilities (SEND) want to be included in school activities and have appropriate access to the curriculum.
The two interventions influence a student’s identity in the classroom.
Evaluate the impact of educational digital technologies, such as social robots and assistive technologies, on the identity of students with SEND in Tayton School.
-
19M.3.HL.TZ0.2a:
Explain how Miketon Town Council could encourage its citizens to use the ride-sharing app.
-
19M.3.HL.TZ0.4:
With reference to the stimulus material above and to your own inquiries, recommend the digital intervention(s) that the council should choose to address the challenge of ensuring mobility associated with living in towns such as Miketon.
-
19M.3.HL.TZ0.3:
It was recently reported that an autonomous vehicle had collided with an elderly person in a wheelchair that had rolled into the road. The autonomous vehicle chose to run over the wheelchair rather than avoid it, as swerving would have put two children at risk. This incident led to a discussion in the council about the ethical decision-making process used by the autonomous vehicle.
Discuss who should be accountable for an accident in the town involving an autonomous vehicle.
-
19M.1.SL.TZ0.1a.i:
Identify two characteristics of a haptic interface.
-
19M.1.SL.TZ0.1a.ii:
Identify two ways how Umair could have represented the algorithms prior to writing his software code.
-
19M.1.SL.TZ0.1a.iii:
Outline one reason why Umair used these representations of the algorithms prior to writing the software code.
-
19M.1.SL.TZ0.1b:
Explain why Umair used surveys, interviews and observation to gather information from visually impaired people during the development of his system.
-
19M.1.SL.TZ0.2a.i:
Identify two types of digital media that could be used to show the potential tracks of Hurricane Irma.
-
19M.1.SL.TZ0.2a.iii:
Outline why visualization is used to present data.
-
19M.1.SL.TZ0.4a.ii:
Outline one problem that may arise if proprietary software rather than open-source software is used to develop algorithms.
-
19M.1.SL.TZ0.2b.i:
Distinguish between data and information.
-
19M.1.SL.TZ0.2b.iii:
Explain why the data collected about Hurricane Irma was not encrypted prior to being transmitted.
-
19M.1.SL.TZ0.2b.ii:
Different weather variables, such as wind speed and temperature, need to be collected in order to predict the track of a hurricane. Wind speed data is sampled more frequently than temperature data in a hurricane.
Explain one reason why wind speed data would be sampled more frequently than temperature data in a hurricane.
-
19M.1.SL.TZ0.3a.i:
In addition to adaptable font size, identify two features of the e-voting graphical user interface (GUI) that could be customized to make it accessible for all voters.
-
19M.1.SL.TZ0.3c:
Evaluate the advantages and disadvantages of e-voting.
-
19M.1.SL.TZ0.4a.i:
Identify two characteristics of artificial intelligence (AI) systems.
-
19M.1.SL.TZ0.2c:
Companies such as Panasonic will not make the data in computer models available to governments, as they are concerned that doing so would compromise their commercial interests.
Discuss whether governments should be able to make private companies such as Panasonic share their data.
-
19M.1.SL.TZ0.3a.iii:
Identify two features of encryption.
-
19M.1.HL.TZ0.5:
How to appropriately interact in an online environment
Increasing numbers of parents are claiming digital technologies that monitor online activities are the best way to protect their children from offensive content. A number of companies, such as mSpy and Qustodio, have developed online monitoring apps.
Other parents claim it is not necessary to monitor their children’s online behaviour, preferring to encourage their children to develop the knowledge and skills to make appropriate choices.
Parents can consider two different interventions to ensure their children use the online environment appropriately:
- Monitor their children’s online behaviour using apps
- Encourage their children to develop the knowledge and skills to use the online environment and make appropriate choices.
With reference to real-life scenarios, evaluate these two interventions.
-
19M.1.SL.TZ0.3a.ii:
Identify two features of authentication.
-
19M.1.SL.TZ0.4b.i:
The developers of the AI software used visualizations as part of the development process.
Explain one reason why visualizations would be used as part of the development process.
-
19M.1.HL.TZ0.6:
Should we completely automate journalism?
Some of the news articles that you read are written by automated journalism software. This software uses algorithms and natural language generators to turn facts and trends into news stories.
Narrative Science, a company that produces automated journalism software, predicts that by 2026 up to 90 % of news articles could be generated by machine learning algorithms.
Discuss whether it is acceptable for news articles to be generated by automated journalism software.
-
19M.1.SL.TZ0.4b.ii:
Explain two problems the developers of the AI system could encounter when gathering the data that will be input into the AI system.
-
17N.1.SL.TZ0.1a.i:
In addition to their voice, identify two ways how a customer can be recognized by CBR Bank’s biometrics technology.
-
17N.1.SL.TZ0.1c:
The chief executive officer (CEO) of CBR Bank, Alice McEwan, said in a recent interview, “CBR Bank will be replacing all passwords, PINs and personal verification questions for our online banking and mobile banking with voice biometrics recognition.”
To what extent are the changes proposed by Alice beneficial for both CBR Bank’s customers and CBR Bank’s IT support?
-
19M.1.SL.TZ0.4c:
To what extent should the decisions of judges be based on algorithms rather than their knowledge and experience?
-
17N.1.SL.TZ0.1a.ii:
Identify the steps used by the voice biometrics technology to authenticate a customer calling CBR Bank.
-
17N.1.SL.TZ0.2a.i:
In addition to providing access to the internet, identify two functions of an internet service provider (ISP).
-
17N.1.SL.TZ0.2a.iii:
Identify two ways that the government could have determined the identity of the persons responsible for posting the offensive images on social media.
-
17N.1.SL.TZ0.1b:
CBR Bank holds a large amount of information on its customers. Some customers are concerned about the security, privacy and anonymity of their data.
For each of the concerns above, explain one policy that CBR Bank could use to address the concerns of its customers.
-
17N.1.SL.TZ0.2a.ii:
Identify two characteristics of a proxy server.
-
17N.1.SL.TZ0.2b:
Many schools block access to social networking websites like Twitter, Facebook and YouTube. However, other schools are investigating two different options:
- Monitoring the network to view what websites the students are viewing.
- Giving different ages of students different levels of access to social media sites.
Analyse these two options.
-
17N.1.SL.TZ0.2c:
Many citizens have raised concerns about the surveillance of their web browsing history or the censorship of selected websites by their national government.
To what extent is it appropriate for national governments to use surveillance and censorship to control citizens’ access to websites?
-
17N.1.SL.TZ0.3a.i:
Apart from heart rate, identify two vital signs that could be recorded by the sports watch.
-
17N.1.SL.TZ0.3c:
The principal at Collège Earlet has been discussing arrangements for sharing data from the students’ watches with a third party, Fitness World.
Discuss whether the principal at Collège Earlet should agree to share data that has been collected by the students’ watches with Fitness World.
-
17N.1.SL.TZ0.4a.i:
Identify two sensors that Robbi could use.
-
17N.1.SL.TZ0.3a.ii:
At the start of each lesson, the student is asked to set their maximum heart rate on the watch to 220 bpm - their age; so in the case of a 15-year-old, it would be 220 bpm − 15 = 205 bpm.
Identify the steps used by the software in the sports watch to encourage students not to exceed their maximum heart rate.
-
17N.1.HL.TZ0.5:
Using a Segway with machine learning capabilities?
The Segway Patroller is a two-wheeled, battery-powered electric vehicle. Recently, Segway Patrollers have been used for security purposes in cities as well as in public spaces such as concerts, railway stations and shopping malls.
The Segway Patroller can travel up to a speed of 20 kilometres per hour (about 12 miles per hour) and travel about 40 kilometres (25 miles) in distance before the battery needs to be recharged.
Figure 3: A Segway Patroller
[Copyright: Urban Mobility GmbH – from https://en.wikipedia.org/wiki/File:Segway_Polizei_4.jpg]
Each Segway Patroller can be customized by adding the following features.- A global positioning system (GPS)-based navigation system
- Machine learning capabilities that include speech, image and pattern recognition
The managers at Oliverstadt Station claim the introduction of upgraded Segways that have a GPS navigation system and machine learning capabilities would lead to improvements in the customer service provided.
Discuss whether the Segway Patrollers at Oliverstadt Station should be upgraded to include machine learning capabilities.
-
17N.1.SL.TZ0.3b.iii:
Explain why the reliability of the sports watches may be a concern for the teachers.
-
17N.1.SL.TZ0.4c:
Robbi’s website claims that, “Robbi is friendly, helpful and intelligent. He can sense and respond, and learns as you engage with him”. Some of the customers who own Robbi are considering whether they could extend the range of tasks Robbi could perform, or whether they should allow Robbi to make decisions for them.
To what extent should individuals rely on social robots like Robbi to act as decision-makers for them?
-
17N.1.SL.TZ0.4a.ii:
Identify the steps Robbi would take in order to turn the air conditioning on and off.
-
17N.1.HL.TZ0.6:
The human face of student counselling
Many Diploma Programme (DP) coordinators are finding they do not have enough time to interview every student before they choose their DP subjects. They are considering purchasing the Student Counselling System, a proprietary management information system (MIS).
The developers of the Student Counselling System claim that, if students complete online questionnaires to determine their interests, abilities and future goals, the system can give them very accurate results, resulting in less than 5% of students changing their diploma subjects. They also claim the Student Counselling System will allow DP coordinators to be able to interview every student, something they cannot do now.
Some DP coordinators have concerns about the automation of this process and believe that advising students is something that is best done by relying on their own professional judgement and intuition.
Discuss whether DP coordinators should rely on the recommendations of the Student Counselling System rather than their own professional judgement and intuition when advising students about what DP subjects to study.
-
18M.1.SL.TZ0.3b.i:
Google will collect large quantities of data that will be held in data centres.
Explain two concerns linked to the increasing number of data centres.
-
18M.1.SL.TZ0.4b:
The research team developing the Robo-Assist project used quantitative and qualitative data to gather information relating to the user.
Explain why the research team collected quantitative and qualitative data.
-
18M.1.SL.TZ0.1c:
The Okavango Medical Centre has received additional funding from the local authority. The centre is investigating the possibility of using these funds to purchase IT equipment that would allow surgeons in Gaborone to carry out surgery remotely.
Evaluate the impact of the purchase of this IT equipment on the medical centre and its patients.
-
18M.1.SL.TZ0.1a.i:
Identify two characteristics of voice over internet protocol (VOIP).
-
18M.1.SL.TZ0.1a.ii:
Identify two reasons why staff at the Okavango Medical Centre would use a form to enter patient data into the database.
-
18M.1.SL.TZ0.1a.iii:
Outline one reason why the Okavango Medical Centre would use a relational database for the patients’ records.
-
18M.1.SL.TZ0.1b:
Dr Schultz has arranged to speak to the local authority in an attempt to get more funding for the medical centre. He intends to use presentation software to create a multimedia presentation to support this speech. Dr Schultz is aware that many people in the audience are annoyed when slideshows are poorly designed.
Explain three design errors Dr Schultz should avoid when creating his multimedia presentation slideshow for the local authority.
-
18M.1.SL.TZ0.3a.iii:
Google may use a range of representations of the algorithms during their development.
Identify two ways how these algorithms may be represented.
-
18M.1.SL.TZ0.3b.ii:
Explain one advantage of using deep learning instead of traditional machine learning techniques.
-
18M.1.SL.TZ0.3c:
It is claimed that the NHS’s partnership with Google is beneficial for both stakeholders. However, concerns have been raised about the ethical implications of this data-sharing agreement.
To what extent is it ethical for the NHS to share patient information about eye scans from Moorfields Eye Hospital with Google?
-
18M.1.SL.TZ0.4c:
Other than for the prevention of injuries, discuss the impacts on workers and employers of the use of exoskeletons in the workplace.
-
18N.1.SL.TZ0.1a.ii:
Identify two reasons why organizations like the NHS would use data analytics.
-
18M.1.SL.TZ0.2a.i:
Identify two characteristics of a peer-to-peer (P2P) network.
-
18M.1.SL.TZ0.2a.ii:
Identify two characteristics of a strong password.
-
18M.1.SL.TZ0.2b.ii:
Explain one reason why it may be difficult to ensure the security of information in a large peer-to-peer network such as bitcoin.
-
18M.1.SL.TZ0.2c:
Bitcoin transactions are made between individuals without the knowledge of banks, governments, or credit card companies. Some governments are investigating whether they should regulate digital transactions, such as those made using bitcoins.
To what extent is it appropriate for governments to regulate digital transactions, such as those made using bitcoins?
-
18M.1.SL.TZ0.3a.ii:
Identify two characteristics of pattern recognition.
-
18M.1.HL.TZ0.5:
Can digital technologies be used sustainably?
Many organizations claim that the most efficient use of information technology (IT) equipment, such as laptops and printers, is to replace them on a regular basis. For example, an organization’s strategy may be to do this every three years.
Other organizations purchase IT equipment that can easily be upgraded by increasing the storage and memory or upgrading the processing capabilities only when required. They claim they do not need to replace their IT equipment on such a regular basis and believe this is a more sustainable practice.
Evaluate the sustainability of these two strategies.
-
18N.1.SL.TZ0.1a.i:
Identify two items of health-related data that could be used to improve the treatment of patients.
-
18N.1.SL.TZ0.1c:
Evaluate the decision by the NHS to share patient data with Google.
-
18M.1.SL.TZ0.2a.iii:
The use of a password is one method of authentication.
Identify two other methods of authentication.
-
18N.1.SL.TZ0.1b:
The agreement between Google and the NHS includes policies for the collection, storage and sharing of patient data.
Explain why it is important that the agreement between Google and the NHS includes policies for the collection, storage and sharing of patient data.
-
18M.1.SL.TZ0.2b.i:
Explain one reason why bitcoin makes use of encryption when transmitting data.
-
18M.1.HL.TZ0.6:
Policing as a human activity?
Toby Walsh, Professor of Artificial Intelligence at the University of New South Wales, Australia, notes that the use of police robots raises “many important questions that we, as a society, have to think about”.
Singapore has started testing patrol robots that survey pedestrian areas in the city-state. Xavier, the mall-cop robot, will be autonomously rolling through the Toa Payoh central district for three weeks scanning for “undesirable social behaviours”.
Figure 4 shows an example of a patrol robot.
Figure 4: An example of a patrol robot
[Image by Jdietsch. PatrolBot.jpg (https://commons.wikimedia.org/wiki/File:PatrolBot.jpg).
Under copyright and licensed under a Creative Commons Attribution 3.0 International License,
https://creativecommons.org/licenses/by-sa/3.0/deed.en (image cropped)]
It has been claimed that the use of patrol robots will lead to more efficient policing.Discuss the extent to which police departments should use patrol robots as a strategy to aid policing.
-
18M.1.SL.TZ0.2b.iii:
Some users of bitcoins are concerned that their anonymity may be compromised by their bitcoin address.
Explain one way in which a bitcoin address may be used to reveal information about a bitcoin user.
-
18M.1.SL.TZ0.3a.i:
Identify two characteristics of an algorithm.
-
18N.1.SL.TZ0.1a.iii:
Identify two reasons why NHS records are stored in a database rather than in a spreadsheet.
-
18N.1.SL.TZ0.2a.i:
Identify two advantages of using text messaging to communicate.
-
18N.1.SL.TZ0.2a.iii:
Outline the difference between the internet and the World Wide Web.
-
18N.1.SL.TZ0.2c:
The government of Cameroon is watching the results of the Agritexte initiative. It is considering two options:
- extending the functionality of Agritexte into a web-based information system
- investing in education and training on the use of the existing Agritexte SMS system.
Evaluate these two options.
-
18N.1.SL.TZ0.3a.i:
Identify two types of digital media ACP could use on its website.
-
18N.1.SL.TZ0.3b.ii:
Explain why each image is watermarked before it is uploaded to ACP’s website.
-
18N.1.SL.TZ0.4a.i:
Identify two sensors that Dennis needs in order to operate successfully in the restaurant.
-
18N.1.SL.TZ0.3a.ii:
Identify two file compression techniques.
-
18N.1.SL.TZ0.3a.iii:
Outline one problem that may be caused by the use of file compression techniques.
-
18N.1.SL.TZ0.3c:
Some people feel uncomfortable about having their photographs taken and posted on a public website.
To what extent is it acceptable for ACP to take photographs of participants, post them online, and sell them without asking their permission?
-
18N.1.SL.TZ0.4a.ii:
Identify two methods that the marketing manager at Gustavo’s could use to collect feedback from customers about Dennis.
-
18N.1.SL.TZ0.4a.iii:
Identify two characteristics of a social robot.
- 18N.1.SL.TZ0.4b: Customers speak to Dennis to give him their orders. Dennis uses natural language processing to...
-
18N.1.HL.TZ0.5:
App or intuition?
Apps have been developed that allow a customer to submit a trip request to a taxi company on their smartphone. These apps allow the customer to select the starting point and final destination of the journey as well as add other information, such as the time of journey and number of passengers.
The developers of the taxi journey app claim it can capture the real-time details of a journey, including the starting point, route, distance travelled, the speed of the car and the final destination. The app integrates this information with real-time traffic information, such as closed roads or accidents. Fares can be estimated before the journey, and the customer can pay digitally with their credit card or by PayPal.
Some traditional taxi drivers in cities such as Paris and Rio de Janeiro have campaigned against the introduction of these apps in taxi companies. Based on previous journeys recorded by the app, the taxi company recommends that their taxi drivers rely on the taxi journey app rather than their own knowledge of the city when determining the best route.
Discuss whether the taxi driver should rely on the taxi journey app, rather than their own knowledge of the city, when determining the best route.
-
19M.1.SL.TZ0.1c:
Umair has decided on a strategy to develop his software and Braille keyboard by using crowdfunding and open-source software.
Discuss the advantages and disadvantages of this strategy.
-
18N.1.HL.TZ0.6:
Selecting candidates for political parties
Political parties often have large numbers of applicants who wish to act as representatives in their various governing bodies. A senior party official must make the final decision about which applicants should be offered which roles. Many roles receive as many as 15 applications, and it is not possible to interview each applicant.
In an attempt to streamline the application process, a prospective representative will need to complete two tasks:
- Completing an online questionnaire.
- Submitting a video where they explain the reasons behind their application.
Neither task will involve the team in the political party.
The applicants will be directed to a link provided by the software developer where they can complete both tasks. The responses to the questionnaires and the videos will be analysed using artificial intelligence (AI).
The software will score the questionnaire and video for each applicant and send it to the senior party official’s team. The applicants with the highest scores will then be invited by the political party for an interview.
The software developers claim this will reduce the number of applications the senior party official needs to process and lead to the most appropriate applicants being selected for an interview.
Discuss whether the political party should introduce the digital system to assist the senior party official when deciding which applicants should be offered roles as representatives.
-
19M.1.SL.TZ0.4a.iii:
The developers of the AI software decided to use supervised machine learning to develop the algorithms in the sentencing software.
Identify two advantages of using supervised learning.
-
22M.1.SL.TZ0.1a.ii:
Identify two ways the smartwatch and cellphone (mobile phone) could use to communicate with each other.
-
22M.1.SL.TZ0.1a.iii:
Outline one reason why protocols such as https are used in the URL to enable digital devices such as the smartwatch and cellphone to communicate with each other.
-
22M.1.SL.TZ0.1b.ii:
Explain why the developers of software products such as the smartwatch app have an ethical obligation to potential users.
-
22M.1.SL.TZ0.1c:
Many people use smartwatches to monitor their vital signs and manage their health.
To what extent should an individual use a smartwatch to manage their health?
-
22M.1.SL.TZ0.1b.i:
Explain why end-users should be involved in the development of software products such as the smartwatch app.
-
22M.1.SL.TZ0.2a.ii:
Identify three advantages of using a relational database rather than a flat-file database.
-
22M.1.SL.TZ0.2b.i:
There are concerns about the reliability of the data being input into the MADAS system.
Explain why data validation and data verification are used to ensure the reliability of the data being input into the MADAS system.
-
22M.1.SL.TZ0.2b.ii:
The MADAS system uses data visualization.
Explain why data visualization is used by the MADAS system.
-
22M.1.SL.TZ0.3b:
The European Union’s (EU) General Data Protection Regulation (GDPR) governs data protection and privacy in the EU. Its regulations give users certain rights in terms of their data.
Explain three principles that should be included in data protection regulations such as GDPR.
-
22M.1.SL.TZ0.2a.i:
Identify three sensors that may be used to detect data about the weather conditions.
-
22M.1.SL.TZ0.4a.iii:
Describe the difference between identification and authentication.
-
22M.1.SL.TZ0.4b.ii:
Explain why using high-resolution images could be a challenge to the implementation of a facial recognition system.
-
22M.1.SL.TZ0.4c:
Discuss the advantages and disadvantages of a government using a facial recognition system that uses artificial intelligence (AI) to monitor the behaviour of its citizens.
-
22M.1.HL.TZ0.5:
Cameras in school
The principal at Flynn School has received requests from parents saying that they would like to monitor their children’s performance in school more closely. He is considering extending the school’s IT system by installing cameras linked to facial recognition software that can record student behaviour in lessons.
The facial recognition software can determine a student’s attention level and behaviour, such as identifying if they are listening, answering questions, talking with other students, or sleeping. The software uses machine learning to analyse each student’s behaviour and gives them a weekly score that is automatically emailed to their parents.
The principal claims that monitoring students’ behaviour more closely will improve the teaching and learning that takes place.
Discuss whether Flynn School should introduce a facial recognition system that uses machine learning to analyse each student’s behaviour and give them a score that is automatically emailed to their parents.
-
22M.1.SL.TZ0.4a.i:
Identify two types of image file.
-
22M.1.SL.TZ0.4a.ii:
Describe the difference between monitoring and surveillance.
-
22M.1.SL.TZ0.4b.i:
Other governments are considering setting up similar systems that will use facial recognition to gather information about the behaviour of its citizens.
Explain why the developers of the new facial recognition system would need both primary and secondary data collection.
-
22M.1.HL.TZ0.6:
Robotic Surgery
Sandy Parkar, the manager of a large hospital, is considering using robots controlled by surgeons to carry out surgical procedures. The surgeon uses a computer console to control the robot (see Figure 5).
Figure 5: Robotic surgery[Source: mathisworks / iStock.]
All the robot’s movements, and the surgical procedure, are recorded. This allows information to be collected about each procedure.In 2022, a patient died while undergoing a surgical procedure in which a surgical robot was used. Sandy claims the manufacturer of the robot should be accountable. This was contested by the manufacturer, and a court case followed to determine who was accountable.
Discuss whether the surgeon, the manufacturer of the surgical robot, or the hospital manager should be held accountable.
-
22M.1.SL.TZ0.3a.i:
Identify two types of cloud computing software applications that students might use at school.
-
22M.1.SL.TZ0.3a.ii:
If the schools in Hesse can no longer use cloud computing software applications, they will need to store their data on a local file server and access it through a local area network (LAN).
Identify two ways in which data could be secured if the school stored it locally.
-
22M.1.SL.TZ0.2c:
To what extent can the use of models and simulations like the MADAS system help prevent future accidents?
-
22M.1.SL.TZ0.3c:
A new school has opened in Switzerland, and its principal and IT manager are considering two options:
Option 1: Using a local client–server network.
Option 2: Using a cloud-based service.
Evaluate these two options.
-
22M.1.SL.TZ0.3a.iii:
Identify two ways in which students could authenticate themselves on their local area network (LAN).
-
22M.1.SL.TZ0.1a.i:
Define the term privacy.
Sub sections and their related questions
3.1 Data
-
19M.2.SL.TZ0.3:
Compare and contrast what Source C and Source D reveal about the implanting of microchips in humans.
-
19M.2.SL.TZ0.4:
To what extent do you agree that the advantages of implanting microchips in humans outweigh the concerns? Use all the sources and your own knowledge.
-
18M.2.SL.TZ0.4:
Mobile devices provide many benefits for children but can also be used inappropriately. Some groups claim it is the responsibility of parents to ensure their children use their mobile devices responsibly, while other groups claim that responsibility lies with other stakeholders, such as schools.
With reference to all the sources and your own knowledge, to what extent do you agree that parents should be responsible for ensuring their children develop safe and healthy habits for mobile device usage?
-
18M.3.HL.TZ0.3:
The students with special educational needs and disabilities (SEND) want to be included in school activities and have appropriate access to the curriculum.
The two interventions influence a student’s identity in the classroom.
Evaluate the impact of educational digital technologies, such as social robots and assistive technologies, on the identity of students with SEND in Tayton School.
-
18M.3.HL.TZ0.4:
With reference to the stimulus material and your own inquiries, recommend whether Tayton School should use social robots and/or assistive technologies to ensure students with SEND can be further integrated into the school.
-
19M.1.SL.TZ0.1b:
Explain why Umair used surveys, interviews and observation to gather information from visually impaired people during the development of his system.
-
19M.1.SL.TZ0.2a.iii:
Outline why visualization is used to present data.
-
19M.1.SL.TZ0.2b.i:
Distinguish between data and information.
-
19M.1.SL.TZ0.2b.ii:
Different weather variables, such as wind speed and temperature, need to be collected in order to predict the track of a hurricane. Wind speed data is sampled more frequently than temperature data in a hurricane.
Explain one reason why wind speed data would be sampled more frequently than temperature data in a hurricane.
-
19M.1.SL.TZ0.2b.iii:
Explain why the data collected about Hurricane Irma was not encrypted prior to being transmitted.
-
19M.1.SL.TZ0.2c:
Companies such as Panasonic will not make the data in computer models available to governments, as they are concerned that doing so would compromise their commercial interests.
Discuss whether governments should be able to make private companies such as Panasonic share their data.
-
19M.1.SL.TZ0.3a.iii:
Identify two features of encryption.
-
19M.1.SL.TZ0.4b.i:
The developers of the AI software used visualizations as part of the development process.
Explain one reason why visualizations would be used as part of the development process.
-
19M.1.SL.TZ0.4b.ii:
Explain two problems the developers of the AI system could encounter when gathering the data that will be input into the AI system.
-
17N.1.SL.TZ0.1b:
CBR Bank holds a large amount of information on its customers. Some customers are concerned about the security, privacy and anonymity of their data.
For each of the concerns above, explain one policy that CBR Bank could use to address the concerns of its customers.
-
17N.1.SL.TZ0.1c:
The chief executive officer (CEO) of CBR Bank, Alice McEwan, said in a recent interview, “CBR Bank will be replacing all passwords, PINs and personal verification questions for our online banking and mobile banking with voice biometrics recognition.”
To what extent are the changes proposed by Alice beneficial for both CBR Bank’s customers and CBR Bank’s IT support?
-
17N.1.SL.TZ0.2c:
Many citizens have raised concerns about the surveillance of their web browsing history or the censorship of selected websites by their national government.
To what extent is it appropriate for national governments to use surveillance and censorship to control citizens’ access to websites?
-
17N.1.SL.TZ0.3a.i:
Apart from heart rate, identify two vital signs that could be recorded by the sports watch.
-
17N.1.SL.TZ0.3b.iii:
Explain why the reliability of the sports watches may be a concern for the teachers.
-
17N.1.SL.TZ0.3c:
The principal at Collège Earlet has been discussing arrangements for sharing data from the students’ watches with a third party, Fitness World.
Discuss whether the principal at Collège Earlet should agree to share data that has been collected by the students’ watches with Fitness World.
-
17N.1.HL.TZ0.5:
Using a Segway with machine learning capabilities?
The Segway Patroller is a two-wheeled, battery-powered electric vehicle. Recently, Segway Patrollers have been used for security purposes in cities as well as in public spaces such as concerts, railway stations and shopping malls.
The Segway Patroller can travel up to a speed of 20 kilometres per hour (about 12 miles per hour) and travel about 40 kilometres (25 miles) in distance before the battery needs to be recharged.
Figure 3: A Segway Patroller
[Copyright: Urban Mobility GmbH – from https://en.wikipedia.org/wiki/File:Segway_Polizei_4.jpg]
Each Segway Patroller can be customized by adding the following features.- A global positioning system (GPS)-based navigation system
- Machine learning capabilities that include speech, image and pattern recognition
The managers at Oliverstadt Station claim the introduction of upgraded Segways that have a GPS navigation system and machine learning capabilities would lead to improvements in the customer service provided.
Discuss whether the Segway Patrollers at Oliverstadt Station should be upgraded to include machine learning capabilities.
-
17N.1.HL.TZ0.6:
The human face of student counselling
Many Diploma Programme (DP) coordinators are finding they do not have enough time to interview every student before they choose their DP subjects. They are considering purchasing the Student Counselling System, a proprietary management information system (MIS).
The developers of the Student Counselling System claim that, if students complete online questionnaires to determine their interests, abilities and future goals, the system can give them very accurate results, resulting in less than 5% of students changing their diploma subjects. They also claim the Student Counselling System will allow DP coordinators to be able to interview every student, something they cannot do now.
Some DP coordinators have concerns about the automation of this process and believe that advising students is something that is best done by relying on their own professional judgement and intuition.
Discuss whether DP coordinators should rely on the recommendations of the Student Counselling System rather than their own professional judgement and intuition when advising students about what DP subjects to study.
-
18M.1.SL.TZ0.1a.ii:
Identify two reasons why staff at the Okavango Medical Centre would use a form to enter patient data into the database.
-
18M.1.SL.TZ0.1a.iii:
Outline one reason why the Okavango Medical Centre would use a relational database for the patients’ records.
-
18M.1.SL.TZ0.1b:
Dr Schultz has arranged to speak to the local authority in an attempt to get more funding for the medical centre. He intends to use presentation software to create a multimedia presentation to support this speech. Dr Schultz is aware that many people in the audience are annoyed when slideshows are poorly designed.
Explain three design errors Dr Schultz should avoid when creating his multimedia presentation slideshow for the local authority.
-
18M.1.SL.TZ0.2b.i:
Explain one reason why bitcoin makes use of encryption when transmitting data.
-
18M.1.SL.TZ0.2b.ii:
Explain one reason why it may be difficult to ensure the security of information in a large peer-to-peer network such as bitcoin.
-
18M.1.SL.TZ0.2b.iii:
Some users of bitcoins are concerned that their anonymity may be compromised by their bitcoin address.
Explain one way in which a bitcoin address may be used to reveal information about a bitcoin user.
-
18M.1.SL.TZ0.3b.i:
Google will collect large quantities of data that will be held in data centres.
Explain two concerns linked to the increasing number of data centres.
-
18M.1.SL.TZ0.3c:
It is claimed that the NHS’s partnership with Google is beneficial for both stakeholders. However, concerns have been raised about the ethical implications of this data-sharing agreement.
To what extent is it ethical for the NHS to share patient information about eye scans from Moorfields Eye Hospital with Google?
-
18M.1.SL.TZ0.4b:
The research team developing the Robo-Assist project used quantitative and qualitative data to gather information relating to the user.
Explain why the research team collected quantitative and qualitative data.
-
18N.1.SL.TZ0.1a.i:
Identify two items of health-related data that could be used to improve the treatment of patients.
-
18N.1.SL.TZ0.1a.ii:
Identify two reasons why organizations like the NHS would use data analytics.
-
18N.1.SL.TZ0.1a.iii:
Identify two reasons why NHS records are stored in a database rather than in a spreadsheet.
-
18N.1.SL.TZ0.1b:
The agreement between Google and the NHS includes policies for the collection, storage and sharing of patient data.
Explain why it is important that the agreement between Google and the NHS includes policies for the collection, storage and sharing of patient data.
-
18N.1.SL.TZ0.1c:
Evaluate the decision by the NHS to share patient data with Google.
-
18N.1.SL.TZ0.3c:
Some people feel uncomfortable about having their photographs taken and posted on a public website.
To what extent is it acceptable for ACP to take photographs of participants, post them online, and sell them without asking their permission?
-
18N.1.SL.TZ0.4a.ii:
Identify two methods that the marketing manager at Gustavo’s could use to collect feedback from customers about Dennis.
-
18N.1.HL.TZ0.5:
App or intuition?
Apps have been developed that allow a customer to submit a trip request to a taxi company on their smartphone. These apps allow the customer to select the starting point and final destination of the journey as well as add other information, such as the time of journey and number of passengers.
The developers of the taxi journey app claim it can capture the real-time details of a journey, including the starting point, route, distance travelled, the speed of the car and the final destination. The app integrates this information with real-time traffic information, such as closed roads or accidents. Fares can be estimated before the journey, and the customer can pay digitally with their credit card or by PayPal.
Some traditional taxi drivers in cities such as Paris and Rio de Janeiro have campaigned against the introduction of these apps in taxi companies. Based on previous journeys recorded by the app, the taxi company recommends that their taxi drivers rely on the taxi journey app rather than their own knowledge of the city when determining the best route.
Discuss whether the taxi driver should rely on the taxi journey app, rather than their own knowledge of the city, when determining the best route.
-
18N.1.HL.TZ0.6:
Selecting candidates for political parties
Political parties often have large numbers of applicants who wish to act as representatives in their various governing bodies. A senior party official must make the final decision about which applicants should be offered which roles. Many roles receive as many as 15 applications, and it is not possible to interview each applicant.
In an attempt to streamline the application process, a prospective representative will need to complete two tasks:
- Completing an online questionnaire.
- Submitting a video where they explain the reasons behind their application.
Neither task will involve the team in the political party.
The applicants will be directed to a link provided by the software developer where they can complete both tasks. The responses to the questionnaires and the videos will be analysed using artificial intelligence (AI).
The software will score the questionnaire and video for each applicant and send it to the senior party official’s team. The applicants with the highest scores will then be invited by the political party for an interview.
The software developers claim this will reduce the number of applications the senior party official needs to process and lead to the most appropriate applicants being selected for an interview.
Discuss whether the political party should introduce the digital system to assist the senior party official when deciding which applicants should be offered roles as representatives.
-
21M.1.SL.TZ0.1b:
Water is becoming increasingly scarce in Chacra Province, and the provincial government is concerned there will be a point when there is not enough water for all of the farms to water their crops or fruit trees.
To manage water for the watering of crops and fruit trees, the provincial government of Chacra Province intends to use computer modelling to calculate how much water each farm in the province will receive.
Explain three factors that will contribute to the accuracy of this computer model.
-
21M.1.SL.TZ0.1c:
The farmers of Chacra Province are concerned about the provincial government using a computer model to determine the amount of water they will be allowed to use to water their fruit trees.
To what extent should the farmers of Chacra Province rely on their knowledge and experience, rather than the computer-based solution provided by the provincial government, to manage the watering of the fruit trees?
-
21M.1.SL.TZ0.3b:
Analyse whether it would be appropriate for Lyrebird to release the biometric data of a user to a third party.
-
21M.1.SL.TZ0.3c:
To what extent do the benefits of using Lyrebird’s voice-cloning software outweigh the concerns that may arise from its use?
-
21M.1.HL.TZ0.5:
A cashless society
In the near future, it is possible that cash will not be accepted as a means of payment in Sweden. People are already using alternative ways of paying, such as mobile payment, card payment and internet payment. Currently, over 95% of citizens in Sweden have internet access.
Many people in Sweden claim there are advantages of using an app developed by Swish. The Swish app allows friends to share a restaurant bill, pay where credit or debit cards are not accepted, for babysitting or parking tickets, or make a donation at church.
However, other people in Sweden claim that making the Swish app the only means of payment may increase inequalities within the country.
Discuss whether countries should pass legislation making apps such as Swish the only means of payment.
-
19N.1.SL.TZ0.1a.i:
Identify two other forms of biometric data Bright Creativa could collect.
-
19N.1.SL.TZ0.1a.ii:
Identify two characteristics of a relational database.
-
19N.1.SL.TZ0.1a.iii:
Identify two methods that could be used to ensure that the data input to the database is accurate.
-
19N.1.SL.TZ0.1b:
As part of the implementation of the biometric authorization system, Bright Creativa has written a privacy policy.
Explain three features that Bright Creativa would need to include in a privacy policy linked to the company’s biometric authorization system.
-
19N.1.SL.TZ0.1c:
To what extent are the benefits of employees’ improved access to company resources outweighed by their concerns about the level of surveillance by the company?
-
19N.1.SL.TZ0.2a.i:
Identify two measurements that could be taken by the weather sensors in Kinakora National Park.
-
19N.1.SL.TZ0.2a.iii:
Identify two methods of visualization that could be used to present information from the new computer modelling system.
-
19N.1.SL.TZ0.2b:
Two methods for informing tourists about wildfires in Kinakora National Park are:
- short message service (SMS) texting/text messaging
- posting information on the Kinakora National Park website.
Analyse these two methods.
-
19N.1.SL.TZ0.2c:
Evaluate Kinakora National Park’s decision to use computer modelling to develop strategies for dealing with wildfires.
-
19N.1.SL.TZ0.3a.i:
Identify two ways how the TailorEd system could provide feedback to students.
-
19N.1.SL.TZ0.3a.ii:
Identify two ways how the data collected about students’ academic progress could be used by TailorEd.
-
19N.1.SL.TZ0.3b:
There are two possible methods for ensuring students use the TailorEd online learning system responsibly. They are:
- restricting access to sites that may be considered inappropriate
- educating the students about acceptable use.
Analyse these two methods.
-
19N.1.SL.TZ0.3c:
To what extent do the benefits of collecting students’ academic progress data outweigh the concerns of the students, teachers and parents?
-
19N.1.SL.TZ0.4c:
To what extent should pattern recognition in AI systems be trusted to make decisions about sending real-time alerts to the police?
-
19N.1.HL.TZ0.5:
Sharing dashcam* footage with police
Many police departments have started campaigns to encourage members of the public to upload footage of possible offences committed by drivers to police websites. The police are looking for footage of activities such as dangerous driving and driving whilst talking on a cellphone/mobile phone.
Members of the public can create an account on the police website to upload footage from their dashcam (see Figure 3). They can also upload their dashcam footage anonymously.
The police claim that using dashcam footage uploaded by the public will help reduce the number of accidents caused by dangerous driving.
Figure 3: An example of a dashcam
* dashcam: a video camera mounted in a vehicle to record activity on roads
Discuss whether this dashcam footage should be used by the police as part of their strategy to reduce the number of accidents caused by dangerous driving. -
19N.1.HL.TZ0.6:
Automated medical image analysis
EBBZS IT, based in Groningen, the Netherlands, intends to develop a system using artificial intelligence (AI) to help doctors at Joelstraat Hospital interpret medical images.
Due to the high resolution* of the digital images (see Figure 4), EBBZS IT claims the AI system will be able to learn from these images to assist doctors when diagnosing patients’ illnesses.
EBBZS IT also claims the AI system will be able to cope with the significant increase in the volume of patients and the increased complexity of their symptoms and conditions.
Figure 4: Examples of digital images used in the AI system
[National Institutes of Health: https://commons.wikimedia.org/wiki/File:
Human_ brain_development_1wk-3mo-1yr-2yr-10yr-T1W-MRI.PNG]
* resolution: the detail an image holds. It can be measured in pixels per centimetre.
Discuss the claim by EBBZS IT that the diagnosis of patients’ illnesses should be based on the information provided by the AI system. -
20N.1.SL.TZ0.1a.i:
Describe two features of the user interface in Figure 1 that make it intuitive.
-
20N.1.SL.TZ0.1a.ii:
Outline one advantage of using a relational database to store this data.
- 20N.1.SL.TZ0.1b: A number of individuals and groups were consulted during the design of the e-voting system to...
-
20N.1.SL.TZ0.1c:
Some states are planning to return to a paper-based voting system, where voters put a cross (X) in the column next to the party of their choice.
Discuss whether these states should retain e-voting or return to a paper-based voting system.
-
20N.1.SL.TZ0.3a.i:
Identify two vital signs that can be recorded by Jaime’s sports watch.
-
20N.1.SL.TZ0.3b:
Jaime has decided to share his personal health information with researchers at the University of Sierra Nevada.
Analyse Jaime’s decision to share his personal health information with the University of Sierra Nevada.
-
20N.1.SL.TZ0.3c:
The development of mobile health apps has changed the way citizens manage their own health and well-being.
Discuss whether citizens like Jaime should rely only on the advice of a health app to manage their own health and well-being.
-
20N.1.SL.TZ0.4b.ii:
Explain why George believes the avatar developers should observe the passengers’ real-time interactions with the system.
-
20N.1.SL.TZ0.4c:
Matt Earle, the CEO of SBE Cruise Lines, has been investigating using artificial intelligence (AI) systems to track passengers and suggest activities they may wish to take part in when they interact with the touch screens on the ship. Some of his colleagues have concerns about taking this approach.
To what extent should Matt rely on the recommendations from the AI system to suggest activities to passengers?
-
20N.1.HL.TZ0.5:
Clouds under the sea
Microsoft has located one of its data centres on the seabed. Project Natick is now operating 100 feet below the surface of the North Sea (see Figure 4).
Figure 4: An artist’s representation of a data centre on the sea bed
[Adapted under sea photo by NOAA on Unsplash]
Microsoft has chosen to develop data centres on the seabed because they claim there are concerns about the environmental impact of data centres built on land. These seabed data centres can be constructed and placed on the sea bed in 90 days. This is compared to the two years that are required for land-based data centres.
Google patented their design for an underwater data centre in 2009. Even though functioning prototypes have been trialled, none have been used commercially.
The demand for data storage is doubling every two years, so it is likely that an increasing number of data centres will need to be constructed. These data centres can be constructed either under the sea or on land.
Discuss whether companies like Microsoft should build data centres on the seabed.
-
21N.1.SL.TZ0.1b.ii:
Rajesh has been told that subscribing to an internet protocol television (IPTV) service may compromise his anonymity.
Distinguish between anonymity and privacy.
-
21N.1.SL.TZ0.1c:
To what extent is it acceptable for Rajesh to use services like a virtual private network (VPN) to access content that may be blocked in the country he is visiting?
-
21N.1.SL.TZ0.2a.i:
Identify two pieces of information about the luggage that may be obtained from this database.
-
21N.1.SL.TZ0.2b:
Analyse the decision by some airports to attach radio frequency identification (RFID) tags to luggage when it is checked in by the passenger, instead of barcode paper printed tags.
-
21N.1.SL.TZ0.2c:
Airlines have databases that contain data about passengers when tickets are booked. This data includes travel dates, itineraries, contact details, passport details and passengers’ home addresses. When passengers purchase a ticket online from an airline company, they have to accept the airline’s terms and conditions by clicking “Agree” (see Figure 3).
Figure 3: Acceptance of airline terms and conditions
Within these terms and conditions, it states that the airline may receive a request to share this data with the government of the country to which the passenger is flying.
Discuss whether airlines should share passengers’ data with the governments of the countries to which they are flying.
-
21N.1.SL.TZ0.3a.i:
Identify two features of a relational database.
-
21N.1.SL.TZ0.3a.ii:
Identify two reasons why a relational database, rather than a flat-file database, is used to store the data for MediResearch.
-
21N.1.SL.TZ0.3a.iii:
Identify two features of data analytics.
-
21N.1.SL.TZ0.3b:
MediResearch is looking to expand access to the genome data it holds by sharing it with other companies.
Explain three strategies that MediResearch could use to ensure the security of the genome data.
-
21N.1.SL.TZ0.3c:
The chief executive officer of MediResearch is considering using cloud-based storage to store the genome data.
Discuss whether MediResearch should move to cloud-based storage.
-
21N.1.SL.TZ0.4a.ii:
Outline one reason why it might be difficult to collect accurate data that can be used for predicting earthquakes.
-
21N.1.SL.TZ0.4b:
Scientists used visualizations, such as in Figure 4, to present the information about predicted earthquake activity.
Analyse the decision to use visualizations.
-
21N.1.SL.TZ0.4c:
Discuss the advantages and disadvantages of using machine learning to predict natural disasters like earthquakes.
-
22M.1.SL.TZ0.1a.i:
Define the term privacy.
-
22M.1.SL.TZ0.1c:
Many people use smartwatches to monitor their vital signs and manage their health.
To what extent should an individual use a smartwatch to manage their health?
-
22M.1.SL.TZ0.2a.ii:
Identify three advantages of using a relational database rather than a flat-file database.
-
22M.1.SL.TZ0.2b.i:
There are concerns about the reliability of the data being input into the MADAS system.
Explain why data validation and data verification are used to ensure the reliability of the data being input into the MADAS system.
-
22M.1.SL.TZ0.2b.ii:
The MADAS system uses data visualization.
Explain why data visualization is used by the MADAS system.
-
22M.1.SL.TZ0.2c:
To what extent can the use of models and simulations like the MADAS system help prevent future accidents?
-
22M.1.SL.TZ0.3b:
The European Union’s (EU) General Data Protection Regulation (GDPR) governs data protection and privacy in the EU. Its regulations give users certain rights in terms of their data.
Explain three principles that should be included in data protection regulations such as GDPR.
-
22M.1.SL.TZ0.4a.ii:
Describe the difference between monitoring and surveillance.
-
22M.1.SL.TZ0.4b.i:
Other governments are considering setting up similar systems that will use facial recognition to gather information about the behaviour of its citizens.
Explain why the developers of the new facial recognition system would need both primary and secondary data collection.
-
22M.1.SL.TZ0.4c:
Discuss the advantages and disadvantages of a government using a facial recognition system that uses artificial intelligence (AI) to monitor the behaviour of its citizens.
-
22M.1.HL.TZ0.5:
Cameras in school
The principal at Flynn School has received requests from parents saying that they would like to monitor their children’s performance in school more closely. He is considering extending the school’s IT system by installing cameras linked to facial recognition software that can record student behaviour in lessons.
The facial recognition software can determine a student’s attention level and behaviour, such as identifying if they are listening, answering questions, talking with other students, or sleeping. The software uses machine learning to analyse each student’s behaviour and gives them a weekly score that is automatically emailed to their parents.
The principal claims that monitoring students’ behaviour more closely will improve the teaching and learning that takes place.
Discuss whether Flynn School should introduce a facial recognition system that uses machine learning to analyse each student’s behaviour and give them a score that is automatically emailed to their parents.
3.2 Algorithms
-
19M.3.HL.TZ0.2b:
Explain why an autonomous vehicle may not choose the best route from Miketon to Towbro, the regional centre.
-
19M.3.HL.TZ0.4:
With reference to the stimulus material above and to your own inquiries, recommend the digital intervention(s) that the council should choose to address the challenge of ensuring mobility associated with living in towns such as Miketon.
-
19M.1.SL.TZ0.1a.ii:
Identify two ways how Umair could have represented the algorithms prior to writing his software code.
-
19M.1.SL.TZ0.1a.iii:
Outline one reason why Umair used these representations of the algorithms prior to writing the software code.
-
19M.1.SL.TZ0.2c:
Companies such as Panasonic will not make the data in computer models available to governments, as they are concerned that doing so would compromise their commercial interests.
Discuss whether governments should be able to make private companies such as Panasonic share their data.
-
19M.1.SL.TZ0.3c:
Evaluate the advantages and disadvantages of e-voting.
-
19M.1.SL.TZ0.4a.ii:
Outline one problem that may arise if proprietary software rather than open-source software is used to develop algorithms.
-
19M.1.HL.TZ0.6:
Should we completely automate journalism?
Some of the news articles that you read are written by automated journalism software. This software uses algorithms and natural language generators to turn facts and trends into news stories.
Narrative Science, a company that produces automated journalism software, predicts that by 2026 up to 90 % of news articles could be generated by machine learning algorithms.
Discuss whether it is acceptable for news articles to be generated by automated journalism software.
-
17N.1.SL.TZ0.3a.ii:
At the start of each lesson, the student is asked to set their maximum heart rate on the watch to 220 bpm - their age; so in the case of a 15-year-old, it would be 220 bpm − 15 = 205 bpm.
Identify the steps used by the software in the sports watch to encourage students not to exceed their maximum heart rate.
-
17N.1.SL.TZ0.4a.ii:
Identify the steps Robbi would take in order to turn the air conditioning on and off.
-
17N.1.HL.TZ0.6:
The human face of student counselling
Many Diploma Programme (DP) coordinators are finding they do not have enough time to interview every student before they choose their DP subjects. They are considering purchasing the Student Counselling System, a proprietary management information system (MIS).
The developers of the Student Counselling System claim that, if students complete online questionnaires to determine their interests, abilities and future goals, the system can give them very accurate results, resulting in less than 5% of students changing their diploma subjects. They also claim the Student Counselling System will allow DP coordinators to be able to interview every student, something they cannot do now.
Some DP coordinators have concerns about the automation of this process and believe that advising students is something that is best done by relying on their own professional judgement and intuition.
Discuss whether DP coordinators should rely on the recommendations of the Student Counselling System rather than their own professional judgement and intuition when advising students about what DP subjects to study.
-
18M.1.SL.TZ0.3a.i:
Identify two characteristics of an algorithm.
-
18M.1.SL.TZ0.3a.iii:
Google may use a range of representations of the algorithms during their development.
Identify two ways how these algorithms may be represented.
-
18M.1.SL.TZ0.3c:
It is claimed that the NHS’s partnership with Google is beneficial for both stakeholders. However, concerns have been raised about the ethical implications of this data-sharing agreement.
To what extent is it ethical for the NHS to share patient information about eye scans from Moorfields Eye Hospital with Google?
-
18M.1.HL.TZ0.6:
Policing as a human activity?
Toby Walsh, Professor of Artificial Intelligence at the University of New South Wales, Australia, notes that the use of police robots raises “many important questions that we, as a society, have to think about”.
Singapore has started testing patrol robots that survey pedestrian areas in the city-state. Xavier, the mall-cop robot, will be autonomously rolling through the Toa Payoh central district for three weeks scanning for “undesirable social behaviours”.
Figure 4 shows an example of a patrol robot.
Figure 4: An example of a patrol robot
[Image by Jdietsch. PatrolBot.jpg (https://commons.wikimedia.org/wiki/File:PatrolBot.jpg).
Under copyright and licensed under a Creative Commons Attribution 3.0 International License,
https://creativecommons.org/licenses/by-sa/3.0/deed.en (image cropped)]
It has been claimed that the use of patrol robots will lead to more efficient policing.Discuss the extent to which police departments should use patrol robots as a strategy to aid policing.
-
18N.1.HL.TZ0.6:
Selecting candidates for political parties
Political parties often have large numbers of applicants who wish to act as representatives in their various governing bodies. A senior party official must make the final decision about which applicants should be offered which roles. Many roles receive as many as 15 applications, and it is not possible to interview each applicant.
In an attempt to streamline the application process, a prospective representative will need to complete two tasks:
- Completing an online questionnaire.
- Submitting a video where they explain the reasons behind their application.
Neither task will involve the team in the political party.
The applicants will be directed to a link provided by the software developer where they can complete both tasks. The responses to the questionnaires and the videos will be analysed using artificial intelligence (AI).
The software will score the questionnaire and video for each applicant and send it to the senior party official’s team. The applicants with the highest scores will then be invited by the political party for an interview.
The software developers claim this will reduce the number of applications the senior party official needs to process and lead to the most appropriate applicants being selected for an interview.
Discuss whether the political party should introduce the digital system to assist the senior party official when deciding which applicants should be offered roles as representatives.
-
21M.1.SL.TZ0.1a.ii:
A computer program uses data provided by a rain sensor to decide whether to water the trees. Identify three ways how the algorithm may be represented.
-
21M.1.SL.TZ0.1c:
The farmers of Chacra Province are concerned about the provincial government using a computer model to determine the amount of water they will be allowed to use to water their fruit trees.
To what extent should the farmers of Chacra Province rely on their knowledge and experience, rather than the computer-based solution provided by the provincial government, to manage the watering of the fruit trees?
-
19N.1.SL.TZ0.2c:
Evaluate Kinakora National Park’s decision to use computer modelling to develop strategies for dealing with wildfires.
-
19N.1.SL.TZ0.4c:
To what extent should pattern recognition in AI systems be trusted to make decisions about sending real-time alerts to the police?
-
20N.1.SL.TZ0.2a.ii:
Identify the steps used by speech-to-text software.
-
20N.1.SL.TZ0.3a.ii:
Identify the steps that the GPS receiver in Jaime’s sports watch uses to show the routes of his training runs.
-
20N.1.SL.TZ0.3c:
The development of mobile health apps has changed the way citizens manage their own health and well-being.
Discuss whether citizens like Jaime should rely only on the advice of a health app to manage their own health and well-being.
-
20N.1.SL.TZ0.4c:
Matt Earle, the CEO of SBE Cruise Lines, has been investigating using artificial intelligence (AI) systems to track passengers and suggest activities they may wish to take part in when they interact with the touch screens on the ship. Some of his colleagues have concerns about taking this approach.
To what extent should Matt rely on the recommendations from the AI system to suggest activities to passengers?
-
21N.1.SL.TZ0.2a.ii:
Identify the steps taken by the luggage control system to decide which conveyor belt to choose when a bag reaches a junction between two conveyor belts.
-
21N.1.SL.TZ0.4a.iii:
Identify two characteristics of an algorithm.
-
21N.1.SL.TZ0.4c:
Discuss the advantages and disadvantages of using machine learning to predict natural disasters like earthquakes.
-
21N.1.HL.TZ0.6:
Smart warehouse
Greenwood Industries’ warehouse uses a smart storage solution for the picking of products from the shelves of the warehouse. Robots are used in this automated picking process.
Currently, these robots are programmed to access a knowledge base* that enables these robots to use the most efficient route for the picking of products.
Greenwood Industries claims the picking process would be improved if the expert system was replaced by an artificial neural network (ANN).
Discuss whether Greenwood Industries should replace the existing system with one that uses an artificial neural network (ANN).
* knowledge base: a set of rules that are manually input into an expert system.
-
22M.1.SL.TZ0.1b.i:
Explain why end-users should be involved in the development of software products such as the smartwatch app.
-
22M.1.SL.TZ0.1b.ii:
Explain why the developers of software products such as the smartwatch app have an ethical obligation to potential users.
-
22M.1.SL.TZ0.1c:
Many people use smartwatches to monitor their vital signs and manage their health.
To what extent should an individual use a smartwatch to manage their health?
-
22M.1.SL.TZ0.2c:
To what extent can the use of models and simulations like the MADAS system help prevent future accidents?
-
22M.1.SL.TZ0.4c:
Discuss the advantages and disadvantages of a government using a facial recognition system that uses artificial intelligence (AI) to monitor the behaviour of its citizens.
-
22M.1.HL.TZ0.5:
Cameras in school
The principal at Flynn School has received requests from parents saying that they would like to monitor their children’s performance in school more closely. He is considering extending the school’s IT system by installing cameras linked to facial recognition software that can record student behaviour in lessons.
The facial recognition software can determine a student’s attention level and behaviour, such as identifying if they are listening, answering questions, talking with other students, or sleeping. The software uses machine learning to analyse each student’s behaviour and gives them a weekly score that is automatically emailed to their parents.
The principal claims that monitoring students’ behaviour more closely will improve the teaching and learning that takes place.
Discuss whether Flynn School should introduce a facial recognition system that uses machine learning to analyse each student’s behaviour and give them a score that is automatically emailed to their parents.
3.3 Computers
-
19M.2.SL.TZ0.4:
To what extent do you agree that the advantages of implanting microchips in humans outweigh the concerns? Use all the sources and your own knowledge.
-
18M.3.HL.TZ0.3:
The students with special educational needs and disabilities (SEND) want to be included in school activities and have appropriate access to the curriculum.
The two interventions influence a student’s identity in the classroom.
Evaluate the impact of educational digital technologies, such as social robots and assistive technologies, on the identity of students with SEND in Tayton School.
-
18M.3.HL.TZ0.4:
With reference to the stimulus material and your own inquiries, recommend whether Tayton School should use social robots and/or assistive technologies to ensure students with SEND can be further integrated into the school.
-
19M.3.HL.TZ0.1b:
Identify two characteristics of ride-sharing apps that have made them popular
-
19M.3.HL.TZ0.2a:
Explain how Miketon Town Council could encourage its citizens to use the ride-sharing app.
-
19M.1.SL.TZ0.1a.i:
Identify two characteristics of a haptic interface.
-
19M.1.SL.TZ0.3a.i:
In addition to adaptable font size, identify two features of the e-voting graphical user interface (GUI) that could be customized to make it accessible for all voters.
-
19M.1.HL.TZ0.5:
How to appropriately interact in an online environment
Increasing numbers of parents are claiming digital technologies that monitor online activities are the best way to protect their children from offensive content. A number of companies, such as mSpy and Qustodio, have developed online monitoring apps.
Other parents claim it is not necessary to monitor their children’s online behaviour, preferring to encourage their children to develop the knowledge and skills to make appropriate choices.
Parents can consider two different interventions to ensure their children use the online environment appropriately:
- Monitor their children’s online behaviour using apps
- Encourage their children to develop the knowledge and skills to use the online environment and make appropriate choices.
With reference to real-life scenarios, evaluate these two interventions.
-
17N.1.SL.TZ0.4a.i:
Identify two sensors that Robbi could use.
-
18M.1.HL.TZ0.5:
Can digital technologies be used sustainably?
Many organizations claim that the most efficient use of information technology (IT) equipment, such as laptops and printers, is to replace them on a regular basis. For example, an organization’s strategy may be to do this every three years.
Other organizations purchase IT equipment that can easily be upgraded by increasing the storage and memory or upgrading the processing capabilities only when required. They claim they do not need to replace their IT equipment on such a regular basis and believe this is a more sustainable practice.
Evaluate the sustainability of these two strategies.
-
18N.1.HL.TZ0.5:
App or intuition?
Apps have been developed that allow a customer to submit a trip request to a taxi company on their smartphone. These apps allow the customer to select the starting point and final destination of the journey as well as add other information, such as the time of journey and number of passengers.
The developers of the taxi journey app claim it can capture the real-time details of a journey, including the starting point, route, distance travelled, the speed of the car and the final destination. The app integrates this information with real-time traffic information, such as closed roads or accidents. Fares can be estimated before the journey, and the customer can pay digitally with their credit card or by PayPal.
Some traditional taxi drivers in cities such as Paris and Rio de Janeiro have campaigned against the introduction of these apps in taxi companies. Based on previous journeys recorded by the app, the taxi company recommends that their taxi drivers rely on the taxi journey app rather than their own knowledge of the city when determining the best route.
Discuss whether the taxi driver should rely on the taxi journey app, rather than their own knowledge of the city, when determining the best route.
-
21M.1.SL.TZ0.4a.i:
In addition to a voice sensor, identify two sensors that would be found in Pepper.
-
19N.1.SL.TZ0.3b:
There are two possible methods for ensuring students use the TailorEd online learning system responsibly. They are:
- restricting access to sites that may be considered inappropriate
- educating the students about acceptable use.
Analyse these two methods.
-
20N.1.SL.TZ0.3c:
The development of mobile health apps has changed the way citizens manage their own health and well-being.
Discuss whether citizens like Jaime should rely only on the advice of a health app to manage their own health and well-being.
-
20N.1.SL.TZ0.4a.ii:
Identify two sensors that the passenger’s bracelet may use.
-
21N.1.SL.TZ0.1a.i:
Identify two hardware devices that Rajesh could use to view his internet protocol television (IPTV) channels.
-
21N.1.HL.TZ0.5:
Smart farming
A government in East Africa is using the expertise of scientists at a university in the region to promote the culture of smart farming and increase the productivity of farmers (see Figure 5). To do this, they have developed an app that the farmers can use to assist them in their decision-making.
Figure 5: An example of farming in East Africa
[Palmer, N., 2010. A farmer at work in Kenya’s Mount Kenya region [image] [online] Available at: https://commons.wikimedia.org/wiki/File:2DU_Kenya_86_(5367322642).jpg (CC BY-SA 2.0) https://creativecommons.org/licenses/by-sa/2.0/deed.en [Accessed 18 May 2020].]
Unfortunately, the scientists who developed the app have received many complaints from farmers who have been unable to use it. They are considering two options:
- making the existing system more user-friendly
- educating the farmers to use the existing system.
The scientists claim by making changes to the app it will make the app more user-friendly for the farmers. However, the farmers claim it would be better to provide them with education, such as training, so they can use the existing app.
Evaluate these two claims.
-
21N.1.HL.TZ0.6:
Smart warehouse
Greenwood Industries’ warehouse uses a smart storage solution for the picking of products from the shelves of the warehouse. Robots are used in this automated picking process.
Currently, these robots are programmed to access a knowledge base* that enables these robots to use the most efficient route for the picking of products.
Greenwood Industries claims the picking process would be improved if the expert system was replaced by an artificial neural network (ANN).
Discuss whether Greenwood Industries should replace the existing system with one that uses an artificial neural network (ANN).
* knowledge base: a set of rules that are manually input into an expert system.
-
22M.1.SL.TZ0.2a.i:
Identify three sensors that may be used to detect data about the weather conditions.
3.4 Networks and the internet
-
19M.2.SL.TZ0.1:
In Source A, employees are using an embedded microchip to gain access to the building.
Identify two digital systems, in addition to implanted microchips, that an employee could use to gain access to a building in Source A.
-
18M.2.SL.TZ0.1:
Identify two trends of social media usage that can be seen in Source A.
-
18M.2.SL.TZ0.4:
Mobile devices provide many benefits for children but can also be used inappropriately. Some groups claim it is the responsibility of parents to ensure their children use their mobile devices responsibly, while other groups claim that responsibility lies with other stakeholders, such as schools.
With reference to all the sources and your own knowledge, to what extent do you agree that parents should be responsible for ensuring their children develop safe and healthy habits for mobile device usage?
-
19M.1.SL.TZ0.2b.iii:
Explain why the data collected about Hurricane Irma was not encrypted prior to being transmitted.
-
19M.1.SL.TZ0.3a.ii:
Identify two features of authentication.
-
19M.1.SL.TZ0.3a.iii:
Identify two features of encryption.
-
19M.1.HL.TZ0.5:
How to appropriately interact in an online environment
Increasing numbers of parents are claiming digital technologies that monitor online activities are the best way to protect their children from offensive content. A number of companies, such as mSpy and Qustodio, have developed online monitoring apps.
Other parents claim it is not necessary to monitor their children’s online behaviour, preferring to encourage their children to develop the knowledge and skills to make appropriate choices.
Parents can consider two different interventions to ensure their children use the online environment appropriately:
- Monitor their children’s online behaviour using apps
- Encourage their children to develop the knowledge and skills to use the online environment and make appropriate choices.
With reference to real-life scenarios, evaluate these two interventions.
-
17N.1.SL.TZ0.1a.i:
In addition to their voice, identify two ways how a customer can be recognized by CBR Bank’s biometrics technology.
-
17N.1.SL.TZ0.1a.ii:
Identify the steps used by the voice biometrics technology to authenticate a customer calling CBR Bank.
-
17N.1.SL.TZ0.1c:
The chief executive officer (CEO) of CBR Bank, Alice McEwan, said in a recent interview, “CBR Bank will be replacing all passwords, PINs and personal verification questions for our online banking and mobile banking with voice biometrics recognition.”
To what extent are the changes proposed by Alice beneficial for both CBR Bank’s customers and CBR Bank’s IT support?
-
17N.1.SL.TZ0.2a.i:
In addition to providing access to the internet, identify two functions of an internet service provider (ISP).
-
17N.1.SL.TZ0.2a.ii:
Identify two characteristics of a proxy server.
-
17N.1.SL.TZ0.2a.iii:
Identify two ways that the government could have determined the identity of the persons responsible for posting the offensive images on social media.
-
17N.1.SL.TZ0.2b:
Many schools block access to social networking websites like Twitter, Facebook and YouTube. However, other schools are investigating two different options:
- Monitoring the network to view what websites the students are viewing.
- Giving different ages of students different levels of access to social media sites.
Analyse these two options.
-
17N.1.SL.TZ0.2c:
Many citizens have raised concerns about the surveillance of their web browsing history or the censorship of selected websites by their national government.
To what extent is it appropriate for national governments to use surveillance and censorship to control citizens’ access to websites?
-
18M.1.SL.TZ0.1a.i:
Identify two characteristics of voice over internet protocol (VOIP).
-
18M.1.SL.TZ0.1c:
The Okavango Medical Centre has received additional funding from the local authority. The centre is investigating the possibility of using these funds to purchase IT equipment that would allow surgeons in Gaborone to carry out surgery remotely.
Evaluate the impact of the purchase of this IT equipment on the medical centre and its patients.
-
18M.1.SL.TZ0.2a.i:
Identify two characteristics of a peer-to-peer (P2P) network.
-
18M.1.SL.TZ0.2a.ii:
Identify two characteristics of a strong password.
-
18M.1.SL.TZ0.2a.iii:
The use of a password is one method of authentication.
Identify two other methods of authentication.
-
18M.1.SL.TZ0.2b.i:
Explain one reason why bitcoin makes use of encryption when transmitting data.
-
18M.1.SL.TZ0.2b.iii:
Some users of bitcoins are concerned that their anonymity may be compromised by their bitcoin address.
Explain one way in which a bitcoin address may be used to reveal information about a bitcoin user.
-
18M.1.SL.TZ0.2c:
Bitcoin transactions are made between individuals without the knowledge of banks, governments, or credit card companies. Some governments are investigating whether they should regulate digital transactions, such as those made using bitcoins.
To what extent is it appropriate for governments to regulate digital transactions, such as those made using bitcoins?
-
18M.1.HL.TZ0.6:
Policing as a human activity?
Toby Walsh, Professor of Artificial Intelligence at the University of New South Wales, Australia, notes that the use of police robots raises “many important questions that we, as a society, have to think about”.
Singapore has started testing patrol robots that survey pedestrian areas in the city-state. Xavier, the mall-cop robot, will be autonomously rolling through the Toa Payoh central district for three weeks scanning for “undesirable social behaviours”.
Figure 4 shows an example of a patrol robot.
Figure 4: An example of a patrol robot
[Image by Jdietsch. PatrolBot.jpg (https://commons.wikimedia.org/wiki/File:PatrolBot.jpg).
Under copyright and licensed under a Creative Commons Attribution 3.0 International License,
https://creativecommons.org/licenses/by-sa/3.0/deed.en (image cropped)]
It has been claimed that the use of patrol robots will lead to more efficient policing.Discuss the extent to which police departments should use patrol robots as a strategy to aid policing.
-
18N.1.SL.TZ0.2a.iii:
Outline the difference between the internet and the World Wide Web.
-
18N.1.SL.TZ0.2c:
The government of Cameroon is watching the results of the Agritexte initiative. It is considering two options:
- extending the functionality of Agritexte into a web-based information system
- investing in education and training on the use of the existing Agritexte SMS system.
Evaluate these two options.
-
18N.1.SL.TZ0.3a.ii:
Identify two file compression techniques.
-
18N.1.SL.TZ0.3a.iii:
Outline one problem that may be caused by the use of file compression techniques.
-
18N.1.SL.TZ0.3b.i:
Explain why each image has its resolution reduced before it is uploaded to ACP’s website.
-
18N.1.SL.TZ0.3b.ii:
Explain why each image is watermarked before it is uploaded to ACP’s website.
-
21M.1.SL.TZ0.2a.ii:
Identify two reasons why there might be a lack of bandwidth at times on the school’s network.
-
21M.1.SL.TZ0.2a.iii:
Identify two potential disadvantages of using online digital media.
-
21M.1.SL.TZ0.2b:
The increasing use of cloud-based applications and online collaborative tools has led to Orams Academy introducing an acceptable use policy for students and teachers.
Explain three reasons why Orams Academy decided to introduce an acceptable use policy.
-
21M.1.SL.TZ0.2c:
Discuss whether Daniela should make every teacher at Orams Academy use the same learning platform or allow each teacher to choose their own preferred learning management approach.
-
21M.1.SL.TZ0.3a.i:
Lyrebird uses a person’s voice print to determine their identity.
Identify three other methods of biometric identification that could be used to determine a person’s identity.
-
21M.1.SL.TZ0.3a.ii:
A person’s voice print can be compressed.
Identify three problems that may result from compressing the voice print.
-
19N.1.SL.TZ0.2b:
Two methods for informing tourists about wildfires in Kinakora National Park are:
- short message service (SMS) texting/text messaging
- posting information on the Kinakora National Park website.
Analyse these two methods.
-
19N.1.SL.TZ0.3a.iii:
Outline how a firewall functions.
-
19N.1.SL.TZ0.3b:
There are two possible methods for ensuring students use the TailorEd online learning system responsibly. They are:
- restricting access to sites that may be considered inappropriate
- educating the students about acceptable use.
Analyse these two methods.
-
19N.1.HL.TZ0.5:
Sharing dashcam* footage with police
Many police departments have started campaigns to encourage members of the public to upload footage of possible offences committed by drivers to police websites. The police are looking for footage of activities such as dangerous driving and driving whilst talking on a cellphone/mobile phone.
Members of the public can create an account on the police website to upload footage from their dashcam (see Figure 3). They can also upload their dashcam footage anonymously.
The police claim that using dashcam footage uploaded by the public will help reduce the number of accidents caused by dangerous driving.
Figure 3: An example of a dashcam
* dashcam: a video camera mounted in a vehicle to record activity on roads
Discuss whether this dashcam footage should be used by the police as part of their strategy to reduce the number of accidents caused by dangerous driving. -
20N.1.SL.TZ0.2a.i:
Identify two pieces of information that would be used to identify a device on the IT network.
-
20N.1.SL.TZ0.2c:
Discuss whether Xingu Academy should become a bring-your-own-device (BYOD) school.
-
20N.1.HL.TZ0.5:
Clouds under the sea
Microsoft has located one of its data centres on the seabed. Project Natick is now operating 100 feet below the surface of the North Sea (see Figure 4).
Figure 4: An artist’s representation of a data centre on the sea bed
[Adapted under sea photo by NOAA on Unsplash]
Microsoft has chosen to develop data centres on the seabed because they claim there are concerns about the environmental impact of data centres built on land. These seabed data centres can be constructed and placed on the sea bed in 90 days. This is compared to the two years that are required for land-based data centres.
Google patented their design for an underwater data centre in 2009. Even though functioning prototypes have been trialled, none have been used commercially.
The demand for data storage is doubling every two years, so it is likely that an increasing number of data centres will need to be constructed. These data centres can be constructed either under the sea or on land.
Discuss whether companies like Microsoft should build data centres on the seabed.
-
21N.1.SL.TZ0.1a.ii:
Identify two features of a virtual private network (VPN).
-
21N.1.SL.TZ0.1a.iii:
Identify two features of a protocol.
-
21N.1.SL.TZ0.1c:
To what extent is it acceptable for Rajesh to use services like a virtual private network (VPN) to access content that may be blocked in the country he is visiting?
-
21N.1.SL.TZ0.3c:
The chief executive officer of MediResearch is considering using cloud-based storage to store the genome data.
Discuss whether MediResearch should move to cloud-based storage.
-
21N.1.HL.TZ0.5:
Smart farming
A government in East Africa is using the expertise of scientists at a university in the region to promote the culture of smart farming and increase the productivity of farmers (see Figure 5). To do this, they have developed an app that the farmers can use to assist them in their decision-making.
Figure 5: An example of farming in East Africa
[Palmer, N., 2010. A farmer at work in Kenya’s Mount Kenya region [image] [online] Available at: https://commons.wikimedia.org/wiki/File:2DU_Kenya_86_(5367322642).jpg (CC BY-SA 2.0) https://creativecommons.org/licenses/by-sa/2.0/deed.en [Accessed 18 May 2020].]
Unfortunately, the scientists who developed the app have received many complaints from farmers who have been unable to use it. They are considering two options:
- making the existing system more user-friendly
- educating the farmers to use the existing system.
The scientists claim by making changes to the app it will make the app more user-friendly for the farmers. However, the farmers claim it would be better to provide them with education, such as training, so they can use the existing app.
Evaluate these two claims.
-
22M.1.SL.TZ0.1a.ii:
Identify two ways the smartwatch and cellphone (mobile phone) could use to communicate with each other.
-
22M.1.SL.TZ0.1a.iii:
Outline one reason why protocols such as https are used in the URL to enable digital devices such as the smartwatch and cellphone to communicate with each other.
-
22M.1.SL.TZ0.1c:
Many people use smartwatches to monitor their vital signs and manage their health.
To what extent should an individual use a smartwatch to manage their health?
-
22M.1.SL.TZ0.3a.i:
Identify two types of cloud computing software applications that students might use at school.
-
22M.1.SL.TZ0.3a.ii:
If the schools in Hesse can no longer use cloud computing software applications, they will need to store their data on a local file server and access it through a local area network (LAN).
Identify two ways in which data could be secured if the school stored it locally.
-
22M.1.SL.TZ0.3a.iii:
Identify two ways in which students could authenticate themselves on their local area network (LAN).
-
22M.1.SL.TZ0.3c:
A new school has opened in Switzerland, and its principal and IT manager are considering two options:
Option 1: Using a local client–server network.
Option 2: Using a cloud-based service.
Evaluate these two options.
-
22M.1.SL.TZ0.4a.iii:
Describe the difference between identification and authentication.
-
22M.1.SL.TZ0.4b.ii:
Explain why using high-resolution images could be a challenge to the implementation of a facial recognition system.
3.5 Media
-
18M.2.SL.TZ0.2:
Suggest two reasons why there has been a significant decrease in in-person communication with teenagers between 2013 and 2019 in Source B.
-
18M.2.SL.TZ0.3:
Compare and contrast the effectiveness of the approaches outlined in Source C and Source D towards the responsible use of mobile devices.
-
18M.2.SL.TZ0.4:
Mobile devices provide many benefits for children but can also be used inappropriately. Some groups claim it is the responsibility of parents to ensure their children use their mobile devices responsibly, while other groups claim that responsibility lies with other stakeholders, such as schools.
With reference to all the sources and your own knowledge, to what extent do you agree that parents should be responsible for ensuring their children develop safe and healthy habits for mobile device usage?
-
19M.1.SL.TZ0.1c:
Umair has decided on a strategy to develop his software and Braille keyboard by using crowdfunding and open-source software.
Discuss the advantages and disadvantages of this strategy.
-
19M.1.SL.TZ0.2a.i:
Identify two types of digital media that could be used to show the potential tracks of Hurricane Irma.
-
19M.1.HL.TZ0.5:
How to appropriately interact in an online environment
Increasing numbers of parents are claiming digital technologies that monitor online activities are the best way to protect their children from offensive content. A number of companies, such as mSpy and Qustodio, have developed online monitoring apps.
Other parents claim it is not necessary to monitor their children’s online behaviour, preferring to encourage their children to develop the knowledge and skills to make appropriate choices.
Parents can consider two different interventions to ensure their children use the online environment appropriately:
- Monitor their children’s online behaviour using apps
- Encourage their children to develop the knowledge and skills to use the online environment and make appropriate choices.
With reference to real-life scenarios, evaluate these two interventions.
-
19M.1.HL.TZ0.6:
Should we completely automate journalism?
Some of the news articles that you read are written by automated journalism software. This software uses algorithms and natural language generators to turn facts and trends into news stories.
Narrative Science, a company that produces automated journalism software, predicts that by 2026 up to 90 % of news articles could be generated by machine learning algorithms.
Discuss whether it is acceptable for news articles to be generated by automated journalism software.
-
17N.1.SL.TZ0.2b:
Many schools block access to social networking websites like Twitter, Facebook and YouTube. However, other schools are investigating two different options:
- Monitoring the network to view what websites the students are viewing.
- Giving different ages of students different levels of access to social media sites.
Analyse these two options.
-
17N.1.SL.TZ0.2c:
Many citizens have raised concerns about the surveillance of their web browsing history or the censorship of selected websites by their national government.
To what extent is it appropriate for national governments to use surveillance and censorship to control citizens’ access to websites?
-
18N.1.SL.TZ0.2a.i:
Identify two advantages of using text messaging to communicate.
-
18N.1.SL.TZ0.3a.i:
Identify two types of digital media ACP could use on its website.
-
18N.1.SL.TZ0.3b.i:
Explain why each image has its resolution reduced before it is uploaded to ACP’s website.
-
18N.1.SL.TZ0.3b.ii:
Explain why each image is watermarked before it is uploaded to ACP’s website.
-
18N.1.SL.TZ0.3c:
Some people feel uncomfortable about having their photographs taken and posted on a public website.
To what extent is it acceptable for ACP to take photographs of participants, post them online, and sell them without asking their permission?
-
21M.1.SL.TZ0.1a.i:
Identify three characteristics of open-source software.
-
21M.1.SL.TZ0.2b:
The increasing use of cloud-based applications and online collaborative tools has led to Orams Academy introducing an acceptable use policy for students and teachers.
Explain three reasons why Orams Academy decided to introduce an acceptable use policy.
-
21M.1.SL.TZ0.3c:
To what extent do the benefits of using Lyrebird’s voice-cloning software outweigh the concerns that may arise from its use?
-
21M.1.HL.TZ0.6:
Fake news
We see and hear news every day and trust that the information provided is accurate. That belief may soon end.
Artificial intelligence (AI) software is now being developed that can produce fake video footage of public figures using recordings of their own voices. Using as little as one minute of user-generated content (data), it can reproduce a particular person’s voice. The developer of this software demonstrated the results by using the voices of Bill Clinton, George Bush and Barack Obama in a computer-generated conversation.
Once a person’s voice has been reproduced, a fake video can be created by processing hundreds of videos of the person’s face. Video footage of politicians are often used, as there is so much data available online.
Law professor John Silverman commented that, as humans we tend to believe what we see, and the increased number of tools to make fake media that is unrecognizable from real media is going to prove a major challenge in the future.
Discuss the claim that companies who develop software that can create fake videos of politicians should be accountable for the fake videos posted by users of their software on social media platforms.
-
19N.1.SL.TZ0.2b:
Two methods for informing tourists about wildfires in Kinakora National Park are:
- short message service (SMS) texting/text messaging
- posting information on the Kinakora National Park website.
Analyse these two methods.
-
19N.1.SL.TZ0.3b:
There are two possible methods for ensuring students use the TailorEd online learning system responsibly. They are:
- restricting access to sites that may be considered inappropriate
- educating the students about acceptable use.
Analyse these two methods.
-
19N.1.HL.TZ0.5:
Sharing dashcam* footage with police
Many police departments have started campaigns to encourage members of the public to upload footage of possible offences committed by drivers to police websites. The police are looking for footage of activities such as dangerous driving and driving whilst talking on a cellphone/mobile phone.
Members of the public can create an account on the police website to upload footage from their dashcam (see Figure 3). They can also upload their dashcam footage anonymously.
The police claim that using dashcam footage uploaded by the public will help reduce the number of accidents caused by dangerous driving.
Figure 3: An example of a dashcam
* dashcam: a video camera mounted in a vehicle to record activity on roads
Discuss whether this dashcam footage should be used by the police as part of their strategy to reduce the number of accidents caused by dangerous driving. -
19N.1.HL.TZ0.6:
Automated medical image analysis
EBBZS IT, based in Groningen, the Netherlands, intends to develop a system using artificial intelligence (AI) to help doctors at Joelstraat Hospital interpret medical images.
Due to the high resolution* of the digital images (see Figure 4), EBBZS IT claims the AI system will be able to learn from these images to assist doctors when diagnosing patients’ illnesses.
EBBZS IT also claims the AI system will be able to cope with the significant increase in the volume of patients and the increased complexity of their symptoms and conditions.
Figure 4: Examples of digital images used in the AI system
[National Institutes of Health: https://commons.wikimedia.org/wiki/File:
Human_ brain_development_1wk-3mo-1yr-2yr-10yr-T1W-MRI.PNG]
* resolution: the detail an image holds. It can be measured in pixels per centimetre.
Discuss the claim by EBBZS IT that the diagnosis of patients’ illnesses should be based on the information provided by the AI system. - 20N.1.SL.TZ0.2b: Digital citizenship is included in Xingu Academy’s IT acceptable use policy. Explain why it is...
-
20N.1.SL.TZ0.4b.i:
Explain why the avatar developers would create avatars that do not look like humans.
- 21N.1.SL.TZ0.1b.i: Explain why Rajesh downloaded films rather than streaming them when he was travelling.
-
22M.1.SL.TZ0.4a.i:
Identify two types of image file.
3.6 Artificial intelligence
-
19M.1.SL.TZ0.4a.i:
Identify two characteristics of artificial intelligence (AI) systems.
-
19M.1.SL.TZ0.4a.iii:
The developers of the AI software decided to use supervised machine learning to develop the algorithms in the sentencing software.
Identify two advantages of using supervised learning.
-
19M.1.SL.TZ0.4c:
To what extent should the decisions of judges be based on algorithms rather than their knowledge and experience?
-
19M.1.HL.TZ0.6:
Should we completely automate journalism?
Some of the news articles that you read are written by automated journalism software. This software uses algorithms and natural language generators to turn facts and trends into news stories.
Narrative Science, a company that produces automated journalism software, predicts that by 2026 up to 90 % of news articles could be generated by machine learning algorithms.
Discuss whether it is acceptable for news articles to be generated by automated journalism software.
-
17N.1.HL.TZ0.5:
Using a Segway with machine learning capabilities?
The Segway Patroller is a two-wheeled, battery-powered electric vehicle. Recently, Segway Patrollers have been used for security purposes in cities as well as in public spaces such as concerts, railway stations and shopping malls.
The Segway Patroller can travel up to a speed of 20 kilometres per hour (about 12 miles per hour) and travel about 40 kilometres (25 miles) in distance before the battery needs to be recharged.
Figure 3: A Segway Patroller
[Copyright: Urban Mobility GmbH – from https://en.wikipedia.org/wiki/File:Segway_Polizei_4.jpg]
Each Segway Patroller can be customized by adding the following features.- A global positioning system (GPS)-based navigation system
- Machine learning capabilities that include speech, image and pattern recognition
The managers at Oliverstadt Station claim the introduction of upgraded Segways that have a GPS navigation system and machine learning capabilities would lead to improvements in the customer service provided.
Discuss whether the Segway Patrollers at Oliverstadt Station should be upgraded to include machine learning capabilities.
-
18M.1.SL.TZ0.3a.ii:
Identify two characteristics of pattern recognition.
-
18M.1.SL.TZ0.3b.ii:
Explain one advantage of using deep learning instead of traditional machine learning techniques.
-
18N.1.SL.TZ0.1c:
Evaluate the decision by the NHS to share patient data with Google.
-
18N.1.SL.TZ0.3b.i:
Explain why each image has its resolution reduced before it is uploaded to ACP’s website.
-
18N.1.SL.TZ0.3b.ii:
Explain why each image is watermarked before it is uploaded to ACP’s website.
- 18N.1.SL.TZ0.4b: Customers speak to Dennis to give him their orders. Dennis uses natural language processing to...
-
21M.1.SL.TZ0.4a.ii:
Outline two reasons why Pepper could not answer a customer’s question in a supermarket.
-
21M.1.SL.TZ0.4b.i:
Identify two advantages of using unsupervised learning to enable Pepper to improve its natural language processing.
-
21M.1.SL.TZ0.4b.ii:
Identify two disadvantages of using unsupervised learning to enable Pepper to improve its natural language processing.
-
21M.1.SL.TZ0.4b.iii:
Pepper is released in batches of a thousand, and they usually sell out immediately.
Explain one reason why Pepper is only released in relatively small batches.
-
21M.1.SL.TZ0.4c:
King Robotics is planning to use social robots in schools. The robots will use a unique approach called care receiving. In this approach to teaching, the robot does not directly instruct the student; instead, the robot makes mistakes and asks the student for help to correct them. Early studies have found that children respond very positively to this approach. The robots will also be able to carry out direct teaching activities.
Evaluate the advantages and disadvantages of using social robots such as Pepper to support the care-receiving teaching approach as well as carry out direct teaching activities.
-
21M.1.HL.TZ0.6:
Fake news
We see and hear news every day and trust that the information provided is accurate. That belief may soon end.
Artificial intelligence (AI) software is now being developed that can produce fake video footage of public figures using recordings of their own voices. Using as little as one minute of user-generated content (data), it can reproduce a particular person’s voice. The developer of this software demonstrated the results by using the voices of Bill Clinton, George Bush and Barack Obama in a computer-generated conversation.
Once a person’s voice has been reproduced, a fake video can be created by processing hundreds of videos of the person’s face. Video footage of politicians are often used, as there is so much data available online.
Law professor John Silverman commented that, as humans we tend to believe what we see, and the increased number of tools to make fake media that is unrecognizable from real media is going to prove a major challenge in the future.
Discuss the claim that companies who develop software that can create fake videos of politicians should be accountable for the fake videos posted by users of their software on social media platforms.
-
19N.1.SL.TZ0.4a.i:
Identify two types of artificial intelligence (AI).
-
19N.1.SL.TZ0.4a.ii:
Identify two types of machine learning.
-
19N.1.SL.TZ0.4a.iii:
Outline how pattern recognition works.
-
19N.1.SL.TZ0.4b.i:
Identify two advantages of using artificial neural networks (ANNs).
-
19N.1.SL.TZ0.4b.ii:
Identify two disadvantages of using artificial neural networks (ANNs).
-
19N.1.SL.TZ0.4b.iii:
Identify two characteristics of deep learning.
-
19N.1.SL.TZ0.4c:
To what extent should pattern recognition in AI systems be trusted to make decisions about sending real-time alerts to the police?
-
19N.1.HL.TZ0.6:
Automated medical image analysis
EBBZS IT, based in Groningen, the Netherlands, intends to develop a system using artificial intelligence (AI) to help doctors at Joelstraat Hospital interpret medical images.
Due to the high resolution* of the digital images (see Figure 4), EBBZS IT claims the AI system will be able to learn from these images to assist doctors when diagnosing patients’ illnesses.
EBBZS IT also claims the AI system will be able to cope with the significant increase in the volume of patients and the increased complexity of their symptoms and conditions.
Figure 4: Examples of digital images used in the AI system
[National Institutes of Health: https://commons.wikimedia.org/wiki/File:
Human_ brain_development_1wk-3mo-1yr-2yr-10yr-T1W-MRI.PNG]
* resolution: the detail an image holds. It can be measured in pixels per centimetre.
Discuss the claim by EBBZS IT that the diagnosis of patients’ illnesses should be based on the information provided by the AI system. -
20N.1.SL.TZ0.4a.iii:
Identify two types of machine learning used by artificial intelligence (AI) systems.
-
20N.1.SL.TZ0.4c:
Matt Earle, the CEO of SBE Cruise Lines, has been investigating using artificial intelligence (AI) systems to track passengers and suggest activities they may wish to take part in when they interact with the touch screens on the ship. Some of his colleagues have concerns about taking this approach.
To what extent should Matt rely on the recommendations from the AI system to suggest activities to passengers?
-
21N.1.SL.TZ0.4a.i:
Identify two characteristics of pattern recognition.
-
21N.1.SL.TZ0.4c:
Discuss the advantages and disadvantages of using machine learning to predict natural disasters like earthquakes.
-
21N.1.HL.TZ0.6:
Smart warehouse
Greenwood Industries’ warehouse uses a smart storage solution for the picking of products from the shelves of the warehouse. Robots are used in this automated picking process.
Currently, these robots are programmed to access a knowledge base* that enables these robots to use the most efficient route for the picking of products.
Greenwood Industries claims the picking process would be improved if the expert system was replaced by an artificial neural network (ANN).
Discuss whether Greenwood Industries should replace the existing system with one that uses an artificial neural network (ANN).
* knowledge base: a set of rules that are manually input into an expert system.
-
22M.1.SL.TZ0.4c:
Discuss the advantages and disadvantages of a government using a facial recognition system that uses artificial intelligence (AI) to monitor the behaviour of its citizens.
-
22M.1.HL.TZ0.5:
Cameras in school
The principal at Flynn School has received requests from parents saying that they would like to monitor their children’s performance in school more closely. He is considering extending the school’s IT system by installing cameras linked to facial recognition software that can record student behaviour in lessons.
The facial recognition software can determine a student’s attention level and behaviour, such as identifying if they are listening, answering questions, talking with other students, or sleeping. The software uses machine learning to analyse each student’s behaviour and gives them a weekly score that is automatically emailed to their parents.
The principal claims that monitoring students’ behaviour more closely will improve the teaching and learning that takes place.
Discuss whether Flynn School should introduce a facial recognition system that uses machine learning to analyse each student’s behaviour and give them a score that is automatically emailed to their parents.
3.7 Robots and autonomous technologies
-
18M.3.HL.TZ0.1a:
Identify two characteristics of a social robot that will make it accepted by students.
-
18M.3.HL.TZ0.1b:
Tayton School has 30 students with attention deficit hyperactivity disorder (ADHD).
Describe one assistive technology solution that could be used by these students.
-
18M.3.HL.TZ0.2a:
An assistive technology app and a social robot can help a student with the same lesson.
Explain one interactive feature of a social robot that will help a student with the same lesson that an app would not be able to do.
-
18M.3.HL.TZ0.2b:
Explain one action that needs to be taken by the school so that the students can benefit from any assisted technology that is purchased.
-
18M.3.HL.TZ0.3:
The students with special educational needs and disabilities (SEND) want to be included in school activities and have appropriate access to the curriculum.
The two interventions influence a student’s identity in the classroom.
Evaluate the impact of educational digital technologies, such as social robots and assistive technologies, on the identity of students with SEND in Tayton School.
-
18M.3.HL.TZ0.4:
With reference to the stimulus material and your own inquiries, recommend whether Tayton School should use social robots and/or assistive technologies to ensure students with SEND can be further integrated into the school.
-
19M.3.HL.TZ0.1a:
Identify two ways how an autonomous vehicle can verify it is collecting the right passenger.
-
19M.3.HL.TZ0.3:
It was recently reported that an autonomous vehicle had collided with an elderly person in a wheelchair that had rolled into the road. The autonomous vehicle chose to run over the wheelchair rather than avoid it, as swerving would have put two children at risk. This incident led to a discussion in the council about the ethical decision-making process used by the autonomous vehicle.
Discuss who should be accountable for an accident in the town involving an autonomous vehicle.
-
19M.3.HL.TZ0.4:
With reference to the stimulus material above and to your own inquiries, recommend the digital intervention(s) that the council should choose to address the challenge of ensuring mobility associated with living in towns such as Miketon.
-
17N.1.SL.TZ0.4c:
Robbi’s website claims that, “Robbi is friendly, helpful and intelligent. He can sense and respond, and learns as you engage with him”. Some of the customers who own Robbi are considering whether they could extend the range of tasks Robbi could perform, or whether they should allow Robbi to make decisions for them.
To what extent should individuals rely on social robots like Robbi to act as decision-makers for them?
-
17N.1.HL.TZ0.5:
Using a Segway with machine learning capabilities?
The Segway Patroller is a two-wheeled, battery-powered electric vehicle. Recently, Segway Patrollers have been used for security purposes in cities as well as in public spaces such as concerts, railway stations and shopping malls.
The Segway Patroller can travel up to a speed of 20 kilometres per hour (about 12 miles per hour) and travel about 40 kilometres (25 miles) in distance before the battery needs to be recharged.
Figure 3: A Segway Patroller
[Copyright: Urban Mobility GmbH – from https://en.wikipedia.org/wiki/File:Segway_Polizei_4.jpg]
Each Segway Patroller can be customized by adding the following features.- A global positioning system (GPS)-based navigation system
- Machine learning capabilities that include speech, image and pattern recognition
The managers at Oliverstadt Station claim the introduction of upgraded Segways that have a GPS navigation system and machine learning capabilities would lead to improvements in the customer service provided.
Discuss whether the Segway Patrollers at Oliverstadt Station should be upgraded to include machine learning capabilities.
-
18M.1.SL.TZ0.4c:
Other than for the prevention of injuries, discuss the impacts on workers and employers of the use of exoskeletons in the workplace.
-
18M.1.HL.TZ0.6:
Policing as a human activity?
Toby Walsh, Professor of Artificial Intelligence at the University of New South Wales, Australia, notes that the use of police robots raises “many important questions that we, as a society, have to think about”.
Singapore has started testing patrol robots that survey pedestrian areas in the city-state. Xavier, the mall-cop robot, will be autonomously rolling through the Toa Payoh central district for three weeks scanning for “undesirable social behaviours”.
Figure 4 shows an example of a patrol robot.
Figure 4: An example of a patrol robot
[Image by Jdietsch. PatrolBot.jpg (https://commons.wikimedia.org/wiki/File:PatrolBot.jpg).
Under copyright and licensed under a Creative Commons Attribution 3.0 International License,
https://creativecommons.org/licenses/by-sa/3.0/deed.en (image cropped)]
It has been claimed that the use of patrol robots will lead to more efficient policing.Discuss the extent to which police departments should use patrol robots as a strategy to aid policing.
-
18N.1.SL.TZ0.4a.i:
Identify two sensors that Dennis needs in order to operate successfully in the restaurant.
-
18N.1.SL.TZ0.4a.iii:
Identify two characteristics of a social robot.
- 18N.1.SL.TZ0.4b: Customers speak to Dennis to give him their orders. Dennis uses natural language processing to...
-
21M.1.SL.TZ0.4b.iii:
Pepper is released in batches of a thousand, and they usually sell out immediately.
Explain one reason why Pepper is only released in relatively small batches.
-
21M.1.SL.TZ0.4c:
King Robotics is planning to use social robots in schools. The robots will use a unique approach called care receiving. In this approach to teaching, the robot does not directly instruct the student; instead, the robot makes mistakes and asks the student for help to correct them. Early studies have found that children respond very positively to this approach. The robots will also be able to carry out direct teaching activities.
Evaluate the advantages and disadvantages of using social robots such as Pepper to support the care-receiving teaching approach as well as carry out direct teaching activities.
-
20N.1.SL.TZ0.4b.i:
Explain why the avatar developers would create avatars that do not look like humans.
-
22M.1.HL.TZ0.6:
Robotic Surgery
Sandy Parkar, the manager of a large hospital, is considering using robots controlled by surgeons to carry out surgical procedures. The surgeon uses a computer console to control the robot (see Figure 5).
Figure 5: Robotic surgery[Source: mathisworks / iStock.]
All the robot’s movements, and the surgical procedure, are recorded. This allows information to be collected about each procedure.In 2022, a patient died while undergoing a surgical procedure in which a surgical robot was used. Sandy claims the manufacturer of the robot should be accountable. This was contested by the manufacturer, and a court case followed to determine who was accountable.
Discuss whether the surgeon, the manufacturer of the surgical robot, or the hospital manager should be held accountable.