DP Computer Science Questionbank
Option C: Web science
Path: |
Description
[N/A]Directly related questions
-
19M.2.SL.TZ0.7d:
Distinguish between lossy and lossless compression.
-
19M.2.SL.TZ0.7a:
Identify two ways that a cascading style sheet (CSS) can be used to ensure web pages are compatible with different screen sizes and formats.
-
19M.2.SL.TZ0.8a.ii:
With reference to the URL https://home.cern/topics/large-hadron-collider
Identify the steps taken by the domain name server when the scientist enters a URL such as https://home.cern into their web browser.
-
19M.2.SL.TZ0.7e:
Explain why the developers at Sestra.com would use lossless compression for the pdf documents.
-
19M.2.SL.TZ0.8c:
Instead of copyrighting its experimental results, CERN has decided to publish its experimental results using Creative Commons licensing.
Explain two reasons why CERN would publish its experimental results using Creative Commons licensing.
-
19M.2.SL.TZ0.7b:
Explain the processing this code enables on the server before
search.php
is sent to the client. -
19M.2.SL.TZ0.8a.i:
With reference to the URL https://home.cern/topics/large-hadron-collider
State the protocol used.
-
19M.2.SL.TZ0.7c:
Describe two ways in which the site developers could use white hat optimization to improve the site’s search engine ranking.
-
19M.2.SL.TZ0.8b:
Explain two reasons why CERN would use grid computing to support its research.
-
19M.2.SL.TZ0.9a:
Define the term extensibility.
-
19M.2.SL.TZ0.9b:
Outline one advantage of XML for sharing data on the web.
-
19M.2.SL.TZ0.9c:
Distinguish between open standards and interoperability.
-
19M.2.SL.TZ0.9f:
To what extent has the use of social media, blogs and forums enabled the head librarian to be a more effective decision maker?
-
19M.2.SL.TZ0.9d:
Describe the role of the common gateway interface (CGI) in processing search requests made via the web form.
-
19M.2.SL.TZ0.9e:
Distinguish between a blog and a forum.
-
19M.2.HL.TZ0.12a.i:
Identify the nodes that represent web pages in the strongly connected core (SCC).
-
19M.2.HL.TZ0.13a:
Outline one advantage for Narayan City of using collective intelligence to solve complex problems such as changing the layout of roads.
-
19M.2.HL.TZ0.12b:
Outline why web page E would be given a higher ranking than web page C using the PageRank algorithm.
-
19M.2.HL.TZ0.12c:
Identify three criteria that may be used by a web crawler to decide whether to index a web page or not.
-
19M.2.HL.TZ0.12a.ii:
Identify the nodes that represent web pages connected by a tube.
-
19M.2.HL.TZ0.12d:
The following information shows the number of active users (in millions) on different social media sites.
Discuss whether the application of power laws is appropriate to predict the future number of active users on these social media sites.
-
19M.2.HL.TZ0.13b:
Many social networking sites allow users to classify their posts and responses, for example by adding one or more “hashtags”.
To what extent does the increasing number of social networking sites and the creation of folksonomies contribute to web users modifying their online behaviour?
-
17N.2.SL.TZ0.7a:
Identify two characteristics of HTML.
-
17N.2.SL.TZ0.7c:
Explain why TCP/IP is a reliable protocol in relation to downloading operations.
-
17N.2.SL.TZ0.9a:
Identify three differences between a static web page and dynamic web page.
-
17N.2.SL.TZ0.7b:
Discuss the benefits and disadvantages of the template including a CSS file in addition to the HTML page.
-
17N.2.SL.TZ0.9c:
Explain how the provision of services on the museum’s website can increase its rankings in search engines.
-
17N.2.SL.TZ0.8a:
Evaluate the use of server-side scripting to provide the mechanism for registration.
-
17N.2.SL.TZ0.7d:
Evaluate lossy compression and lossless compression when used to download files.
-
17N.2.SL.TZ0.8d:
A fragment of a script and a web form are provided below.
In the script some functions are not implemented, and only their specification is provided.<?php
//include a database of urls
include('url_db.php');
$url = $short = "";
if ($_SERVER["REQUEST_METHOD"] == "POST")
{ $url = $_POST['url'];
$short = make_short($url);
function make_short($u)
{ $x = make_alpha_string($u);
$y = first4_last4($x);
$z = limits($x);
$v = $y. ".".$z; //string concatenation
return $v;
}
function make_alpha_string($u)
{ // It removes, in this order: substrings corresponding to
// protocol names, the substring www, and all characters
// except for letters
}
function first4_last4($u)
{ // It returns the string made of the first 4 characters
// followed by the last 4 characters of $u
}
function limits($u)
{ // It returns the string made of the first character and
// last character of $u
}
mysql_query("
INSERT INTO url_db(orig_url, short_url, url_ip) VALUES
( '".$_POST['url']."',
'".$short."',
'".$_SERVER['REMOTE_ADDR']."'
)
");
}
?>
<form method="post" action="">
URL:
<input type="text" name="url" />
<br><br>
<input type="submit" name="Submit" value="Submit" />
</form>Describe the processing that occurs when the form is filled with the URL https://www.the2nd.org/bin.php?id=70 that the server discovers is associated with the IP address 172.16.254.1.
-
17N.2.SL.TZ0.8b:
Explain how the user’s privacy can be maintained whilst using this method of authentication.
-
17N.2.SL.TZ0.8c.ii:
Outline the steps that the script could perform for sending out these notifications.
-
17N.2.SL.TZ0.9b:
Suggest two services, and the benefits that they would provide, if the museum were to redesign its website to be dynamic.
-
17N.2.SL.TZ0.8c.i:
Outline, with an example, how the URL for these new pieces of code will be generated.
-
17N.2.SL.TZ0.9d:
It is also suggested that the museum’s basic catalogue be revised and upgraded with all of the museum’s pieces being catalogued using meta-tags.
Suggest how the use of meta-tags can be relevant for search engine optimization.
-
17N.2.HL.TZ0.13a:
Identify the nodes in the strongly connected core.
-
17N.2.HL.TZ0.13b:
Identify the set of OUT nodes.
-
17N.2.HL.TZ0.13f:
Power laws are often used to model phenomena occurring in very large networks and predict their evolution. Power laws may be suitably applied in different cases, in the context of the World Wide Web.
With reference to the relation between the number of documents in the web and the number of hyperlinks in each of them, suggest how power laws may help to explain the shape of the World Wide Web.
-
17N.2.HL.TZ0.14a:
Discuss the technologies that ambient intelligence uses in this specific scenario.
-
17N.2.HL.TZ0.14b:
With a focus on privacy, discuss how traffic data from WiFi communication through smartphones can be used in this scenario.
- 17N.2.HL.TZ0.13c: Outline why the edge between node 2 and node 1 is a tendril.
-
17N.2.HL.TZ0.13d:
Identify two reasons why an edge may disappear in the new graph, for example the edge between node 5 and node 4.
- 17N.2.HL.TZ0.13e: State how many hyperlinks are in the document corresponding to node 6.
-
18N.2.SL.TZ0.7b:
Outline one technical reason for restricting the number of podcasts to eight.
-
18N.2.SL.TZ0.7d:
Compare these two approaches for a person who downloads or streams these podcasts.
-
18N.2.SL.TZ0.7e:
Outline one reason for this problem.
-
18N.2.SL.TZ0.8a:
Describe how this URL provides security in communication over the Internet.
-
18N.2.SL.TZ0.7a:
Identify two actions relating to the source of these podcasts that should be taken by the newspaper before publishing them.
-
18N.2.SL.TZ0.7f:
These podcasts are normally displayed on the website in the chronological order in which they were added, with the most recent on top. However, users who regularly access the site for science podcasts, may see them presented in a different order, with all the scientific ones on top.
With reference to the technology involved, explain how this is made possible.
-
18N.2.SL.TZ0.8b:
Identify the steps that the Domain Name System (DNS) server will take in order to locate the correct IP address for this request from the browser.
-
18N.2.SL.TZ0.8c:
Outline how the footer of a web page can be made identical across all pages of a website.
-
18N.2.SL.TZ0.7c:
State one format for an audio file.
-
18N.2.SL.TZ0.8e:
Users may perform several actions on their shopping baskets. These actions require interaction with a central database of products. Each record in this database includes the identifier, the name and the price of one of these products.
Consider the following fragment of code:
<
$basket = new Basket
…
If $_REQUEST['action'] == 'removeBasketItem' && !empty($_REQUEST['id']){
remove($basket, $_REQUEST['id']);
header("view_basket.php");
}
>From the code, identify the information that the user has provided.
-
18N.2.SL.TZ0.8d:
Suggest the function of this fragment of code.
-
18N.2.SL.TZ0.9b:
Explain how the use of cloud-based services may help Harvest to overcome the limitations of the available technologies.
-
18N.2.SL.TZ0.9d:
Harvest wishes to improve its ranking in the major search engines.
Discuss whether Harvest should use black hat search engine optimization techniques in order to improve its ranking. -
18N.2.SL.TZ0.9a:
Outline one technical challenge that Harvest may encounter in setting up its own website with the technologies that it has available.
-
18N.2.SL.TZ0.9c:
Describe two problems this may cause for an organizsation such as Harvest.
-
18N.2.HL.TZ0.12a:
With the use of an example, explain how a multimedia search in the semantic web would be preferable to a text based search for this student.
-
18N.2.HL.TZ0.12c:
Discuss whether it is possible to integrate the expressivity of folksonomies with the authoritativeness of ontologies.
-
18N.2.HL.TZ0.12d:
Explain the role that web crawlers perform in developing this index.
-
18N.2.HL.TZ0.12b:
Identify three differences between an ontology and a folksonomy.
-
18N.2.HL.TZ0.12e:
Open source software, such as Linux, is often developed by using the collective intelligence of the developer community.
Explain how collective intelligence can lead to the successful development of open source software.
-
19N.2.SL.TZ0.7b.i:
State the type of scripting used in the php code.
-
19N.2.SL.TZ0.7a.i:
State the protocol used in the company’s website.
-
19N.2.SL.TZ0.8b:
Distinguish between the principles of these two algorithms.
-
19N.2.SL.TZ0.8c:
Describe the difference between cloud computing and local client-server architecture.
-
19N.2.SL.TZ0.8d.i:
State the alternative type of compression to lossy.
-
19N.2.SL.TZ0.7a.ii:
Explain the importance of protocols on the World Wide Web.
-
19N.2.SL.TZ0.7c:
Identify one additional method of online interaction that can be incorporated in this website.
-
19N.2.SL.TZ0.7b.ii:
State one inbuilt function along with parameters used in the php code.
-
19N.2.SL.TZ0.7b.iii:
Describe the processing that occurs when the subscribe button is clicked.
-
19N.2.SL.TZ0.7d:
OrderYourFoods is concerned that it never appears close to the top of the list of search results when the term “food delivery” is typed into a search engine.
OrderYourFoods has decided to use black hat search engine optimization techniques to be more visible in search engines.
Evaluate this decision.
-
19N.2.SL.TZ0.8a:
Define the term search engine.
-
19N.2.SL.TZ0.8d.ii:
Evaluate the advantages and disadvantages for students of using compressed images in their IB Coursework.
-
19N.2.SL.TZ0.8e:
A PNG image uses open standards.
Distinguish between interoperability and open standards.
-
19N.2.SL.TZ0.9d:
Explain how the use of a distributed network, such as the World Wide Web, may lead to copyright and intellectual property issues.
-
19N.2.SL.TZ0.9a:
Explain why a distributed network such as the World Wide Web may act as a catalyst to increase the collaboration between different IB World Schools.
-
19N.2.SL.TZ0.9c:
Describe how a domain name server (DNS) functions.
-
19N.2.SL.TZ0.9b:
Explain one function of a web browser.
-
19N.2.HL.TZ0.12a:
Draw a directed graph based on the scenario.
-
19N.2.HL.TZ0.12c:
Outline two issues that may arise from using a non-text based search.
-
19N.2.HL.TZ0.12d:
OBI has decided to gather information for one project by utilizing collective intelligence.
Evaluate this decision.
-
19N.2.HL.TZ0.13:
Southend Council in England is considering whether to use Pepper, a humanoid robot, to assist some elderly residents that live in care homes. These elderly residents suffer from memory loss and would rely on Pepper to direct them them to and from the local shops. Pepper uses ambient intelligence and is connected to the Internet of Things (IoT).
Explain why Southend Council may have concerns about introducing Pepper for this purpose.
-
19N.2.HL.TZ0.12b:
Describe the role of graph theory in determining the connectivity of the World Wide Web.
-
20N.2.SL.TZ0.7a.i:
State the output of the
index.html
file in the web browser. -
20N.2.SL.TZ0.7d:
Describe the working of the common gateway interface (CGI).
-
20N.2.SL.TZ0.8a:
Distinguish between the internet and the World Wide Web.
-
20N.2.SL.TZ0.7a.ii:
Describe the processing that takes place when the user inputs “Pugh” into the text box and then uses the
clickme
button. -
20N.2.SL.TZ0.7b:
Explain why these two validation checks occur on different computer systems.
-
20N.2.SL.TZ0.7e:
Pugh University uses cloud computing services, such as Google Docs or Office 365.
Describe how cloud computing is different to a client–server architecture.
-
20N.2.SL.TZ0.8d:
Web crawlers browse the World Wide Web.
Explain how data stored in a meta-tag is used by a web crawler.
-
20N.2.SL.TZ0.9d:
The founders of the World Wide Web intended it to be a decentralized and democratic environment.
To what extent have the aspirations of the founders of the World Wide Web been met?
-
20N.2.SL.TZ0.7c:
Explain how website certificates are used to authenticate a user’s browser through secure protocol communications like HTTPS.
-
20N.2.SL.TZ0.8b:
Outline two advantages of using open standards.
-
20N.2.SL.TZ0.8c:
Outline why a search engine using the HITS algorithm might produce different page ranking from one using the PageRank algorithm.
-
20N.2.SL.TZ0.9a:
Distinguish between the surface web and the deep web.
-
20N.2.SL.TZ0.9b:
Explain how a user’s anonymity can be maintained while accessing the dark web.
-
20N.2.SL.TZ0.9c:
Explain why users have concerns about opening up ports to upload and download data.
-
20N.2.HL.TZ0.12b:
Explain why a user can still navigate from one web page to another web page in the same amount of time as previously, even though the number of web pages is significantly larger.
-
20N.2.HL.TZ0.12c:
Outline two reasons why there needs to be a balance between expressivity and usability on the semantic web.
-
20N.2.HL.TZ0.12d:
Identify two features of ambient intelligence.
-
20N.2.HL.TZ0.12e:
Evaluate the role of collective intelligence in the advancement of human knowledge.
-
20N.2.HL.TZ0.12a:
Describe how a web graph can be used to represent the connectivity of the World Wide Web.
-
18M.2.SL.TZ0.9b.i:
State two metrics used by search engines.
-
18M.2.SL.TZ0.9b.ii:
Explain why maintaining a clean HTML source code of a website by removing old information optimizes the search process.
-
18M.2.SL.TZ0.7a:
Outline the relationship between the Internet and the world wide web (WWW).
-
18M.2.SL.TZ0.8a:
Describe how a wiki can support the ongoing collaboration in producing the triathletes’ resource.
-
18M.2.SL.TZ0.7d:
Explain why server-side processing is used in this case.
-
18M.2.SL.TZ0.7e:
The 20 most recent account transactions can be displayed on screen in a webpage that uses XML. A print-out of all transactions of the past three months may be obtained by clicking an onscreen button on the webpage. The print-out is landscape oriented and shows many more columns than are displayed on the screen.
Describe how this processing takes place with reference to the use of XML and XSLT.
-
18M.2.SL.TZ0.8b.ii:
Outline the processing that takes place when the line of code above is executed.
-
18M.2.SL.TZ0.8c:
Suggest why lossy compression should be the compression technique used.
-
18M.2.SL.TZ0.9c:
The evolution of the web, architectures, protocols and their uses has led to increasingly sophisticated services that run on peer-2-peer (P2P) architectures.
Explain how a P2P network can provide more reliability than a client-server model.
-
18M.2.SL.TZ0.9a.i:
Outline the functioning of this app. Include specific references to the technology and software involved.
-
18M.2.SL.TZ0.9a.ii:
With reference to the use on mobile devices, outline a feature of this application that may rely on client-side scripting.
-
18M.2.SL.TZ0.8d:
The RunAndBeyond website continually automatically updates its content regarding a live sporting event.
Suggest how a dynamic web page would function in providing this service to the user.
-
18M.2.SL.TZ0.7b:
Explain why the choice of browser should not affect a customer’s ability to access their bank account details.
-
18M.2.SL.TZ0.7c:
State two features that make HTTPS more suitable than HTTP in the context of home banking.
-
18M.2.SL.TZ0.8b.i:
State the reason why the above link is a URL.
-
18M.2.SL.TZ0.3c:
Outline what would be necessary to make the above unnormalized table conform to 1st Normal Form (1NF).
Sub sections and their related questions
C.1 Creating the web
-
18M.2.SL.TZ0.3c:
Outline what would be necessary to make the above unnormalized table conform to 1st Normal Form (1NF).
-
18M.2.SL.TZ0.7a:
Outline the relationship between the Internet and the world wide web (WWW).
-
18M.2.SL.TZ0.7b:
Explain why the choice of browser should not affect a customer’s ability to access their bank account details.
-
18M.2.SL.TZ0.7c:
State two features that make HTTPS more suitable than HTTP in the context of home banking.
-
18M.2.SL.TZ0.7d:
Explain why server-side processing is used in this case.
-
18M.2.SL.TZ0.7e:
The 20 most recent account transactions can be displayed on screen in a webpage that uses XML. A print-out of all transactions of the past three months may be obtained by clicking an onscreen button on the webpage. The print-out is landscape oriented and shows many more columns than are displayed on the screen.
Describe how this processing takes place with reference to the use of XML and XSLT.
-
18M.2.SL.TZ0.8a:
Describe how a wiki can support the ongoing collaboration in producing the triathletes’ resource.
-
18M.2.SL.TZ0.8b.i:
State the reason why the above link is a URL.
-
18M.2.SL.TZ0.8b.ii:
Outline the processing that takes place when the line of code above is executed.
-
18M.2.SL.TZ0.8d:
The RunAndBeyond website continually automatically updates its content regarding a live sporting event.
Suggest how a dynamic web page would function in providing this service to the user.
-
18M.2.SL.TZ0.9a.i:
Outline the functioning of this app. Include specific references to the technology and software involved.
-
18M.2.SL.TZ0.9a.ii:
With reference to the use on mobile devices, outline a feature of this application that may rely on client-side scripting.
-
19M.2.SL.TZ0.7a:
Identify two ways that a cascading style sheet (CSS) can be used to ensure web pages are compatible with different screen sizes and formats.
-
19M.2.SL.TZ0.7b:
Explain the processing this code enables on the server before
search.php
is sent to the client. -
19M.2.SL.TZ0.8a.i:
With reference to the URL https://home.cern/topics/large-hadron-collider
State the protocol used.
-
19M.2.SL.TZ0.8a.ii:
With reference to the URL https://home.cern/topics/large-hadron-collider
Identify the steps taken by the domain name server when the scientist enters a URL such as https://home.cern into their web browser.
-
19M.2.SL.TZ0.9a:
Define the term extensibility.
-
19M.2.SL.TZ0.9b:
Outline one advantage of XML for sharing data on the web.
-
19M.2.SL.TZ0.9e:
Distinguish between a blog and a forum.
-
19M.2.SL.TZ0.9f:
To what extent has the use of social media, blogs and forums enabled the head librarian to be a more effective decision maker?
-
17N.2.SL.TZ0.7a:
Identify two characteristics of HTML.
-
17N.2.SL.TZ0.7b:
Discuss the benefits and disadvantages of the template including a CSS file in addition to the HTML page.
-
17N.2.SL.TZ0.7c:
Explain why TCP/IP is a reliable protocol in relation to downloading operations.
-
17N.2.SL.TZ0.8a:
Evaluate the use of server-side scripting to provide the mechanism for registration.
-
17N.2.SL.TZ0.8c.i:
Outline, with an example, how the URL for these new pieces of code will be generated.
-
17N.2.SL.TZ0.8c.ii:
Outline the steps that the script could perform for sending out these notifications.
-
17N.2.SL.TZ0.8d:
A fragment of a script and a web form are provided below.
In the script some functions are not implemented, and only their specification is provided.<?php
//include a database of urls
include('url_db.php');
$url = $short = "";
if ($_SERVER["REQUEST_METHOD"] == "POST")
{ $url = $_POST['url'];
$short = make_short($url);
function make_short($u)
{ $x = make_alpha_string($u);
$y = first4_last4($x);
$z = limits($x);
$v = $y. ".".$z; //string concatenation
return $v;
}
function make_alpha_string($u)
{ // It removes, in this order: substrings corresponding to
// protocol names, the substring www, and all characters
// except for letters
}
function first4_last4($u)
{ // It returns the string made of the first 4 characters
// followed by the last 4 characters of $u
}
function limits($u)
{ // It returns the string made of the first character and
// last character of $u
}
mysql_query("
INSERT INTO url_db(orig_url, short_url, url_ip) VALUES
( '".$_POST['url']."',
'".$short."',
'".$_SERVER['REMOTE_ADDR']."'
)
");
}
?>
<form method="post" action="">
URL:
<input type="text" name="url" />
<br><br>
<input type="submit" name="Submit" value="Submit" />
</form>Describe the processing that occurs when the form is filled with the URL https://www.the2nd.org/bin.php?id=70 that the server discovers is associated with the IP address 172.16.254.1.
-
17N.2.SL.TZ0.9a:
Identify three differences between a static web page and dynamic web page.
-
17N.2.SL.TZ0.9b:
Suggest two services, and the benefits that they would provide, if the museum were to redesign its website to be dynamic.
-
18N.2.SL.TZ0.7b:
Outline one technical reason for restricting the number of podcasts to eight.
-
18N.2.SL.TZ0.7c:
State one format for an audio file.
-
18N.2.SL.TZ0.7e:
Outline one reason for this problem.
-
18N.2.SL.TZ0.7f:
These podcasts are normally displayed on the website in the chronological order in which they were added, with the most recent on top. However, users who regularly access the site for science podcasts, may see them presented in a different order, with all the scientific ones on top.
With reference to the technology involved, explain how this is made possible.
-
18N.2.SL.TZ0.8a:
Describe how this URL provides security in communication over the Internet.
-
18N.2.SL.TZ0.8b:
Identify the steps that the Domain Name System (DNS) server will take in order to locate the correct IP address for this request from the browser.
-
18N.2.SL.TZ0.8c:
Outline how the footer of a web page can be made identical across all pages of a website.
-
18N.2.SL.TZ0.8d:
Suggest the function of this fragment of code.
-
18N.2.SL.TZ0.8e:
Users may perform several actions on their shopping baskets. These actions require interaction with a central database of products. Each record in this database includes the identifier, the name and the price of one of these products.
Consider the following fragment of code:
<
$basket = new Basket
…
If $_REQUEST['action'] == 'removeBasketItem' && !empty($_REQUEST['id']){
remove($basket, $_REQUEST['id']);
header("view_basket.php");
}
>From the code, identify the information that the user has provided.
-
19N.2.SL.TZ0.7a.i:
State the protocol used in the company’s website.
-
19N.2.SL.TZ0.7a.ii:
Explain the importance of protocols on the World Wide Web.
-
19N.2.SL.TZ0.7b.i:
State the type of scripting used in the php code.
-
19N.2.SL.TZ0.7b.ii:
State one inbuilt function along with parameters used in the php code.
-
19N.2.SL.TZ0.7b.iii:
Describe the processing that occurs when the subscribe button is clicked.
-
19N.2.SL.TZ0.7c:
Identify one additional method of online interaction that can be incorporated in this website.
-
19N.2.SL.TZ0.9b:
Explain one function of a web browser.
-
19N.2.SL.TZ0.9c:
Describe how a domain name server (DNS) functions.
-
20N.2.SL.TZ0.7a.i:
State the output of the
index.html
file in the web browser. -
20N.2.SL.TZ0.7a.ii:
Describe the processing that takes place when the user inputs “Pugh” into the text box and then uses the
clickme
button. -
20N.2.SL.TZ0.7b:
Explain why these two validation checks occur on different computer systems.
-
20N.2.SL.TZ0.7c:
Explain how website certificates are used to authenticate a user’s browser through secure protocol communications like HTTPS.
-
20N.2.SL.TZ0.7d:
Describe the working of the common gateway interface (CGI).
-
20N.2.SL.TZ0.8a:
Distinguish between the internet and the World Wide Web.
C.2 Searching the web
-
18M.2.SL.TZ0.3c:
Outline what would be necessary to make the above unnormalized table conform to 1st Normal Form (1NF).
-
18M.2.SL.TZ0.9b.i:
State two metrics used by search engines.
-
18M.2.SL.TZ0.9b.ii:
Explain why maintaining a clean HTML source code of a website by removing old information optimizes the search process.
-
19M.2.SL.TZ0.7c:
Describe two ways in which the site developers could use white hat optimization to improve the site’s search engine ranking.
-
17N.2.SL.TZ0.9c:
Explain how the provision of services on the museum’s website can increase its rankings in search engines.
-
17N.2.SL.TZ0.9d:
It is also suggested that the museum’s basic catalogue be revised and upgraded with all of the museum’s pieces being catalogued using meta-tags.
Suggest how the use of meta-tags can be relevant for search engine optimization.
-
18N.2.SL.TZ0.9d:
Harvest wishes to improve its ranking in the major search engines.
Discuss whether Harvest should use black hat search engine optimization techniques in order to improve its ranking. -
19N.2.SL.TZ0.7d:
OrderYourFoods is concerned that it never appears close to the top of the list of search results when the term “food delivery” is typed into a search engine.
OrderYourFoods has decided to use black hat search engine optimization techniques to be more visible in search engines.
Evaluate this decision.
-
19N.2.SL.TZ0.8a:
Define the term search engine.
-
19N.2.SL.TZ0.8b:
Distinguish between the principles of these two algorithms.
-
20N.2.SL.TZ0.8c:
Outline why a search engine using the HITS algorithm might produce different page ranking from one using the PageRank algorithm.
-
20N.2.SL.TZ0.8d:
Web crawlers browse the World Wide Web.
Explain how data stored in a meta-tag is used by a web crawler.
C.3 Distributed approaches to the web
-
18M.2.SL.TZ0.3c:
Outline what would be necessary to make the above unnormalized table conform to 1st Normal Form (1NF).
-
18M.2.SL.TZ0.8c:
Suggest why lossy compression should be the compression technique used.
-
18M.2.SL.TZ0.9c:
The evolution of the web, architectures, protocols and their uses has led to increasingly sophisticated services that run on peer-2-peer (P2P) architectures.
Explain how a P2P network can provide more reliability than a client-server model.
-
19M.2.SL.TZ0.7d:
Distinguish between lossy and lossless compression.
-
19M.2.SL.TZ0.7e:
Explain why the developers at Sestra.com would use lossless compression for the pdf documents.
-
19M.2.SL.TZ0.8b:
Explain two reasons why CERN would use grid computing to support its research.
-
19M.2.SL.TZ0.9c:
Distinguish between open standards and interoperability.
-
19M.2.SL.TZ0.9d:
Describe the role of the common gateway interface (CGI) in processing search requests made via the web form.
-
17N.2.SL.TZ0.7d:
Evaluate lossy compression and lossless compression when used to download files.
-
18N.2.SL.TZ0.7d:
Compare these two approaches for a person who downloads or streams these podcasts.
-
19N.2.SL.TZ0.8d.i:
State the alternative type of compression to lossy.
-
19N.2.SL.TZ0.8d.ii:
Evaluate the advantages and disadvantages for students of using compressed images in their IB Coursework.
-
19N.2.SL.TZ0.8e:
A PNG image uses open standards.
Distinguish between interoperability and open standards.
-
19N.2.SL.TZ0.9a:
Explain why a distributed network such as the World Wide Web may act as a catalyst to increase the collaboration between different IB World Schools.
-
20N.2.SL.TZ0.8b:
Outline two advantages of using open standards.
-
20N.2.SL.TZ0.9c:
Explain why users have concerns about opening up ports to upload and download data.
C.4 The evolving web
-
18M.2.SL.TZ0.3c:
Outline what would be necessary to make the above unnormalized table conform to 1st Normal Form (1NF).
-
19M.2.SL.TZ0.8c:
Instead of copyrighting its experimental results, CERN has decided to publish its experimental results using Creative Commons licensing.
Explain two reasons why CERN would publish its experimental results using Creative Commons licensing.
-
17N.2.SL.TZ0.8b:
Explain how the user’s privacy can be maintained whilst using this method of authentication.
-
18N.2.SL.TZ0.7a:
Identify two actions relating to the source of these podcasts that should be taken by the newspaper before publishing them.
-
18N.2.SL.TZ0.9a:
Outline one technical challenge that Harvest may encounter in setting up its own website with the technologies that it has available.
-
18N.2.SL.TZ0.9b:
Explain how the use of cloud-based services may help Harvest to overcome the limitations of the available technologies.
-
18N.2.SL.TZ0.9c:
Describe two problems this may cause for an organizsation such as Harvest.
-
19N.2.SL.TZ0.8c:
Describe the difference between cloud computing and local client-server architecture.
-
19N.2.SL.TZ0.9d:
Explain how the use of a distributed network, such as the World Wide Web, may lead to copyright and intellectual property issues.
-
20N.2.SL.TZ0.7e:
Pugh University uses cloud computing services, such as Google Docs or Office 365.
Describe how cloud computing is different to a client–server architecture.
-
20N.2.SL.TZ0.9a:
Distinguish between the surface web and the deep web.
-
20N.2.SL.TZ0.9b:
Explain how a user’s anonymity can be maintained while accessing the dark web.
-
20N.2.SL.TZ0.9d:
The founders of the World Wide Web intended it to be a decentralized and democratic environment.
To what extent have the aspirations of the founders of the World Wide Web been met?
C.5 Analysing the web
-
18M.2.SL.TZ0.3c:
Outline what would be necessary to make the above unnormalized table conform to 1st Normal Form (1NF).
-
19M.2.HL.TZ0.12a.i:
Identify the nodes that represent web pages in the strongly connected core (SCC).
-
19M.2.HL.TZ0.12a.ii:
Identify the nodes that represent web pages connected by a tube.
-
19M.2.HL.TZ0.12b:
Outline why web page E would be given a higher ranking than web page C using the PageRank algorithm.
-
19M.2.HL.TZ0.12c:
Identify three criteria that may be used by a web crawler to decide whether to index a web page or not.
-
19M.2.HL.TZ0.12d:
The following information shows the number of active users (in millions) on different social media sites.
Discuss whether the application of power laws is appropriate to predict the future number of active users on these social media sites.
-
17N.2.HL.TZ0.13a:
Identify the nodes in the strongly connected core.
-
17N.2.HL.TZ0.13b:
Identify the set of OUT nodes.
- 17N.2.HL.TZ0.13c: Outline why the edge between node 2 and node 1 is a tendril.
-
17N.2.HL.TZ0.13d:
Identify two reasons why an edge may disappear in the new graph, for example the edge between node 5 and node 4.
- 17N.2.HL.TZ0.13e: State how many hyperlinks are in the document corresponding to node 6.
-
17N.2.HL.TZ0.13f:
Power laws are often used to model phenomena occurring in very large networks and predict their evolution. Power laws may be suitably applied in different cases, in the context of the World Wide Web.
With reference to the relation between the number of documents in the web and the number of hyperlinks in each of them, suggest how power laws may help to explain the shape of the World Wide Web.
-
18N.2.HL.TZ0.12d:
Explain the role that web crawlers perform in developing this index.
-
19N.2.HL.TZ0.12a:
Draw a directed graph based on the scenario.
-
19N.2.HL.TZ0.12b:
Describe the role of graph theory in determining the connectivity of the World Wide Web.
-
20N.2.HL.TZ0.12a:
Describe how a web graph can be used to represent the connectivity of the World Wide Web.
-
20N.2.HL.TZ0.12b:
Explain why a user can still navigate from one web page to another web page in the same amount of time as previously, even though the number of web pages is significantly larger.
C.6 The intelligent web
-
18M.2.SL.TZ0.3c:
Outline what would be necessary to make the above unnormalized table conform to 1st Normal Form (1NF).
-
19M.2.HL.TZ0.13a:
Outline one advantage for Narayan City of using collective intelligence to solve complex problems such as changing the layout of roads.
-
19M.2.HL.TZ0.13b:
Many social networking sites allow users to classify their posts and responses, for example by adding one or more “hashtags”.
To what extent does the increasing number of social networking sites and the creation of folksonomies contribute to web users modifying their online behaviour?
-
17N.2.HL.TZ0.14a:
Discuss the technologies that ambient intelligence uses in this specific scenario.
-
17N.2.HL.TZ0.14b:
With a focus on privacy, discuss how traffic data from WiFi communication through smartphones can be used in this scenario.
-
18N.2.HL.TZ0.12a:
With the use of an example, explain how a multimedia search in the semantic web would be preferable to a text based search for this student.
-
18N.2.HL.TZ0.12b:
Identify three differences between an ontology and a folksonomy.
-
18N.2.HL.TZ0.12c:
Discuss whether it is possible to integrate the expressivity of folksonomies with the authoritativeness of ontologies.
-
18N.2.HL.TZ0.12e:
Open source software, such as Linux, is often developed by using the collective intelligence of the developer community.
Explain how collective intelligence can lead to the successful development of open source software.
-
19N.2.HL.TZ0.12c:
Outline two issues that may arise from using a non-text based search.
-
19N.2.HL.TZ0.12d:
OBI has decided to gather information for one project by utilizing collective intelligence.
Evaluate this decision.
-
19N.2.HL.TZ0.13:
Southend Council in England is considering whether to use Pepper, a humanoid robot, to assist some elderly residents that live in care homes. These elderly residents suffer from memory loss and would rely on Pepper to direct them them to and from the local shops. Pepper uses ambient intelligence and is connected to the Internet of Things (IoT).
Explain why Southend Council may have concerns about introducing Pepper for this purpose.
-
20N.2.HL.TZ0.12c:
Outline two reasons why there needs to be a balance between expressivity and usability on the semantic web.
-
20N.2.HL.TZ0.12d:
Identify two features of ambient intelligence.
-
20N.2.HL.TZ0.12e:
Evaluate the role of collective intelligence in the advancement of human knowledge.