top of page

ITGS + Digital Society  IBDP

Digital Society Blog

3.3 Computers: Digital Society Deep Dive

  • Writer: lukewatsonteach
    lukewatsonteach
  • Apr 4
  • 35 min read

Updated: May 8


THE PAST: Foundations & Evolution of Computing

Level 1: Essentials (Time-Poor Students - Night Before) [AO1]

1.1 Computing Generations Timeline

Research Task: Create a visual timeline showing the five generations of computing with key identifying features.


Essential Elements to Include:

  • First Generation (1940-1956): Vacuum tubes, ENIAC, UNIVAC

  • Second Generation (1956-1963): Transistors, IBM 1401, programming languages

  • Third Generation (1964-1971): Integrated circuits, IBM System/360, minicomputers

  • Fourth Generation (1971-2010): Microprocessors, personal computers, networking

  • Fifth Generation (2010-Present): AI, cloud computing, mobile devices


Sample Exam Questions:

  • Define the term "generation" as used in the context of computing history. [2 marks]

  • State two defining characteristics of the Third Generation of computing. [2 marks]

  • Identify the key technology that enabled the transition from the First to the Second Generation of computing. [2 marks]

  • Outline the progression of computing generations from the 1940s to the present day. [4 marks]


1.2 Moore's Law Visualisation

Research Task: Find data on transistor counts from 1971 to present and create a simple visual representation of Moore's Law.


Essential Elements to Include:

  • Exponential curve showing transistor count doubling approximately every 2 years

  • 4-5 key processor examples plotted on timeline (e.g., Intel 4004, 8086, Pentium, Core i7)

  • Brief definition of Moore's Law and its significance


Sample Exam Questions:

  • Define Moore's Law as it relates to computing development. [2 marks]

  • State when Moore's Law was first formulated and by whom. [2 marks]

  • Identify two consequences of Moore's Law for computing evolution. [2 marks]

  • Outline two challenges currently facing the continuation of Moore's Law. [4 marks]


1.3 Historical Computer Types Reference Table

Research Task: Create a comparison table of historical computer types.


Essential Elements to Include:

  • Mainframe Computers: Definition, example image, typical uses, distinguishing features

  • Servers: Definition, example image, typical uses, distinguishing features

  • Personal Computers: Definition, example image, typical uses, distinguishing features

  • Terminals: Definition, example image, typical uses, distinguishing features


Sample Exam Questions:

  • Define the term "mainframe computer" as used in digital society. [2 marks]

  • State two primary uses of server computers in the evolution of computing. [2 marks]

  • Identify three historical types of computers that preceded modern personal computers. [3 marks]

  • Describe the main characteristics of terminals and their relationship to mainframe computers. [4 marks]


1.4 Component Evolution Visual Guide

Research Task: Research the evolution of key computer components and create a visual summary.


Essential Elements to Include:

  • CPU Evolution: From vacuum tubes to multi-core processors (4-5 key stages)

  • Memory Evolution: From delay lines to modern RAM (4-5 key stages)

  • Storage Evolution: From punch cards to solid-state drives (4-5 key stages)

  • Brief caption for each stage noting capacity, speed, and size improvements


Sample Exam Questions:

  • Define the term "central processing unit" as used in computing. [2 marks]

  • State two key advantages of solid-state storage compared to magnetic hard drives. [2 marks]

  • Identify three major storage technologies used throughout computing history. [3 marks]

  • Outline the evolution of computer memory from the First to the Fourth Generation of computing. [4 marks]


Level 2: Exploration (3-9 Hours of Study) [AO2]

2.1 Moore's Law Implications Analysis


Research Task: Analyze the broader implications of Moore's Law beyond just transistor counts.


Student Output Format: 1-2 page analytical report with supporting visuals


Essential Elements to Include:

  • Analysis of how Moore's Law affected:

    • Computer size and portability

    • Energy consumption and heat generation

    • Cost of computing and accessibility

    • Development of new applications and industries

  • Current challenges to continued scaling:

    • Physical limitations (quantum effects, heat dissipation)

    • Economic limitations (manufacturing costs)

    • Alternative approaches being explored


Sample Exam Questions:

  • Explain how Moore's Law has influenced the development of mobile computing devices. [4 marks]

  • Explain two physical limitations that are currently challenging the continuation of Moore's Law. [4 marks]

  • Compare the impact of Moore's Law on computing costs and computing performance over the past three decades. [6 marks]

  • Examine how technology companies are adapting their strategies in response to the slowing of traditional Moore's Law scaling. [6 marks]


2.2 Programming Paradigms Analysis

Research Task: Research major programming paradigms across computing history and analyze their distinguishing features.


Student Output Format: Comparative analysis with code examples


Essential Elements to Include:

  • Machine/Assembly Programming: Characteristics, example, advantages/limitations

  • Procedural Programming: Characteristics, example, advantages/limitations

  • Structured Programming: Characteristics, example, advantages/limitations

  • Object-Oriented Programming: Characteristics, example, advantages/limitations

  • Declarative Programming: Characteristics, example, advantages/limitations


Sample Exam Questions:

  • Explain two key differences between procedural programming and object-oriented programming. [4 marks]

  • Explain how structured programming addressed limitations of earlier programming approaches. [4 marks]

  • Compare and contrast object-oriented programming and declarative programming, with reference to specific examples. [6 marks]

  • Examine how the evolution of programming paradigms has affected software development practices in digital society. [6 marks]


2.3 Programming Languages Evolution

Research Task: Create a visual representation showing the evolution of programming languages and their relationships.


Student Output Format: Language family tree or timeline with annotations


Essential Elements to Include:

  • Early languages (FORTRAN, COBOL, LISP)

  • Middle-era languages (C, Pascal, Smalltalk)

  • Modern languages (Java, Python, JavaScript)

  • Specialized languages (SQL, R, MATLAB)

  • Connections showing influences between languages


Sample Exam Questions:

  • Explain how early programming languages like FORTRAN and COBOL were designed for different purposes. [4 marks]

  • Explain two ways in which hardware advances have enabled new programming language features. [4 marks]

  • Compare the characteristics of general-purpose programming languages and domain-specific languages, using specific examples. [6 marks]

  • Examine the factors that contribute to the widespread adoption of a programming language in digital society. [6 marks]


Level 3: Deep Dive (Expert Level) [AO3]

3.1 Computing Evolution Synthesis Activity


Research Task: Research how computing evolution connects to broader historical, economic, and social developments.


Essential Elements to Include:

  • Analysis of how computing evolution was influenced by:

    • Military and defense needs (WWII, Cold War)

    • Business and commercial requirements

    • Academic and scientific research

    • Consumer demand and expectations

    • Government funding and policies

  • Evaluation of how computing evolution influenced:

    • Economic development and industry transformation

    • Social communication and information access

    • Power dynamics between nations, companies, and individuals

    • Education and knowledge distribution

    • Artistic and creative expression


Sample Exam Questions:

  1. Evaluate the extent to which military needs have shaped the evolution of computing technology. [8 marks]

    • Response Tips for Top Marks:

      • Present a balanced evaluation considering both significant military influence (ENIAC, ARPANET) and other factors

      • Support arguments with specific historical examples from different time periods

      • Assess the changing relationship between military and commercial development over time

      • Reach a nuanced conclusion about the relative importance of military influence compared to other factors


  2. Discuss how the evolution of computing has transformed power relationships within digital society. [8 marks]

    • Response Tips for Top Marks:

      • Consider multiple types of power relationships (economic, political, social)

      • Analyze both democratizing effects (e.g., access to information) and concentrating effects (e.g., tech giants)

      • Support with specific examples from different computing generations

      • Consider perspectives from different global regions or socioeconomic contexts

      • Develop a balanced discussion that acknowledges complexity rather than one-sided arguments


  3. To what extent has the evolution of computing been driven primarily by technological innovation rather than human needs? [12 marks]

    • Response Tips for Top Marks:

      • Develop a conceptual framework for analyzing the relationship between technological innovation and human needs

      • Present a balanced argument considering both technology-push and demand-pull factors

      • Support with detailed examples from multiple computing generations

      • Consider counterarguments and limitations to your position

      • Contextualize examples within their historical periods

      • Reach a substantiated conclusion that directly addresses the question

      • Demonstrate awareness of how this relationship has evolved over time


  4. Evaluate the claim that the democratization of computing power has created more social equality than inequality. [12 marks]

    • Response Tips for Top Marks:

      • Define key terms clearly, particularly "democratization" and how equality/inequality is being measured

      • Develop evaluation criteria (economic, educational, political, etc.)

      • Present a balanced evaluation with strong supporting evidence for both positions

      • Consider global perspectives and differences between regions/populations

      • Analyze specific computing developments and their impacts across different social groups

      • Reference relevant research or theoretical frameworks

      • Reach a nuanced conclusion that acknowledges complexity and avoids oversimplification

      • Consider how impacts have changed across different computing generations


  5. Discuss the ethical implications of computing's historical evolution for future technology development. [12 marks]

    • Response Tips for Top Marks:

      • Identify persistent ethical issues across computing history (privacy, access, automation effects)

      • Analyze how ethical responses have evolved over time

      • Connect historical patterns to current and emerging ethical challenges

      • Consider multiple stakeholder perspectives (developers, users, regulators)

      • Support arguments with specific examples from different computing eras

      • Demonstrate understanding of ethical frameworks beyond just personal opinion

      • Consider how past ethical successes and failures might inform future approaches

      • Develop a forward-looking discussion that shows deep understanding of both historical context and emerging challenges

THE PRESENT: Current Computing Landscape

Level 1: Essentials (Time-Poor Students - Night Before) [AO1]

1.1 Modern Computer Types Identification

Research Task: Create a visual reference guide of current computer types with key features.


Essential Elements to Include:

  • Mainframes: Modern characteristics, current uses, example image

  • Servers: Types (web, application, database), cloud infrastructure, example image

  • Personal Computers: Desktops, laptops, workstations, example images

  • Tablets: Key characteristics, operating systems, example images

  • Smart/Mobile Devices: Smartphones, specialized mobile computing, example images

  • Wearable Computers: Smartwatches, fitness trackers, AR/VR headsets, example images


Sample Exam Questions:

  • Define the term "wearable computer" as used in digital society. [2 marks]

  • State two key characteristics that distinguish tablets from personal computers. [2 marks]

  • Identify three different types of servers used in modern computing infrastructure. [3 marks]

  • Describe the main features of modern mainframe computers and their typical uses. [4 marks]


1.2 Computer Components Quick Reference

Research Task: Create a visual guide identifying current computer components and their functions.


Essential Elements to Include:

  • Hardware Components:

    • Motherboard: Function, key parts, connection types

    • CPU: Current architectures, cores, clock speeds

    • Memory: RAM types, typical capacities

    • Storage: SSD, HDD, hybrid solutions

    • Graphics/Sound: Dedicated vs. integrated, capabilities

    • Power Supply: Types, ratings, efficiency

    • Input/Output: Common ports, wireless connections

    • Sensors: Types and purposes in modern devices


Sample Exam Questions:

  • Define the term "motherboard" in the context of computer hardware. [2 marks]

  • State two differences between solid-state drives (SSD) and hard disk drives (HDD). [2 marks]

  • Identify three types of sensors commonly found in smart mobile devices. [3 marks]

  • Outline the main functions of a central processing unit (CPU) in a modern computer system. [4 marks]


1.3 Modern Interfaces Guide

Research Task: Create a reference chart of contemporary computer interfaces.


Essential Elements to Include:

  • User Interfaces:

    • Graphical User Interfaces: Components, interaction methods

    • Haptic Interfaces: Feedback mechanisms, implementation examples

    • Voice Interfaces: Speech recognition, virtual assistants

    • Gesture Interfaces: Motion detection, implementation examples

    • Brain-Computer Interfaces: Emerging applications, basic principles


Sample Exam Questions:

  • Define the term "haptic interface" as used in modern computing. [2 marks]

  • State two key advantages of voice interfaces compared to traditional input methods. [2 marks]

  • Identify three common elements found in graphical user interfaces. [3 marks]

  • Describe how gesture interfaces function in modern computing devices. [4 marks]


1.4 Software Categories Overview

Research Task: Create a classification system for modern software types.


Essential Elements to Include:

  • Operating Systems: Functions, major examples, market share

  • Application Software: Categories, distribution methods, platforms

  • Mobile Apps: Types, development approaches, ecosystems

  • System Software: Utilities, drivers, management tools

  • Malicious Software: Types, distribution methods, impacts


Sample Exam Questions:

  • Define the term "operating system" in the context of computer software. [2 marks]

  • State two distinguishing features of mobile apps compared to traditional software applications. [2 marks]

  • Identify three major categories of malicious software and their primary characteristics. [3 marks]

  • Outline the main functions of an operating system in modern computing. [4 marks]


Level 2: Exploration (3-9 Hours of Study) [AO2]

2.1 Component Architecture Analysis

Research Task: Research and analyze how modern computer components work together as systems.


Essential Elements to Include:

  • System Architecture:

    • How components communicate (buses, interfaces)

    • Performance bottlenecks and balancing

    • System design philosophies (modularity, integration)

    • Specialized architectures (gaming, content creation, servers)

  • Processing Architectures:

    • Multi-core processing

    • CPU vs. GPU computing

    • Specialized processors (AI accelerators, DSPs)

    • Instruction set architectures


Sample Exam Questions:

  • Explain how multiple cores in a CPU improve computing performance for different types of tasks. [4 marks]

  • Explain two ways that specialized processors differ from general-purpose CPUs in modern computing. [4 marks]

  • Compare the architectures of personal computers and mobile devices, focusing on design trade-offs. [6 marks]

  • Examine how the balance between different components affects overall system performance in modern computers. [6 marks]


2.2 Interface Design Evolution

Research Task: Analyze the evolution and principles of modern computer interfaces.


Essential Elements to Include:

  • Design Principles:

    • User-centered design approaches

    • Accessibility considerations

    • Cross-platform consistency

    • Mental models and intuitive design

  • Interaction Paradigms:

    • Direct manipulation vs. command-based

    • Natural user interfaces (voice, gesture)

    • Adaptive and contextual interfaces

    • Immersive environments (VR/AR)

  • Current Trends:

    • Minimalist design

    • Dark mode and visual considerations

    • Microinteractions and feedback

    • Personalization and adaptivity


Sample Exam Questions:

  • Explain two ways that user-centered design principles have influenced modern interface development. [4 marks]

  • Explain how natural user interfaces differ from traditional graphical user interfaces in terms of interaction methods. [4 marks]

  • Compare the advantages and limitations of voice interfaces and touch interfaces in different computing contexts. [6 marks]

  • Examine how interface design has evolved to accommodate the constraints of mobile devices. [6 marks]


2.3 Operating Systems Comparison

Research Task: Conduct a comparative analysis of current operating systems.


Essential Elements to Include:

  • Major Operating Systems:

    • Windows: Architecture, market positioning, strengths/weaknesses

    • macOS: Architecture, market positioning, strengths/weaknesses

    • Linux: Distributions, architecture, strengths/weaknesses

    • Android: Architecture, fragmentation issues, strengths/weaknesses

    • iOS: Architecture, ecosystem integration, strengths/weaknesses

  • Key Comparison Factors:

    • User interface design philosophy

    • Security models and implementation

    • Software distribution approaches

    • Resource management strategies

    • Development ecosystems


Sample Exam Questions:

  • Explain two significant differences between the security models of Windows and Linux operating systems. [4 marks]

  • Explain how mobile operating systems manage resources differently compared to desktop operating systems. [4 marks]

  • Compare the approaches to software distribution in iOS and Android operating systems. [6 marks]

  • Examine how operating system design influences the relationship between users and software developers. [6 marks]


Level 3: Deep Dive (Expert Level) [AO3]

3.1 Interface Accessibility Analysis

Research Task: Evaluate how current interface designs address or fail to address accessibility needs.


Essential Elements to Include:

  • Accessibility Considerations:

    • Visual impairments and adaptations

    • Motor skill limitations and adaptations

    • Cognitive accessibility considerations

    • Hearing impairments and adaptations

    • Temporary and situational disabilities

  • Implementation Approaches:

    • Built-in accessibility features

    • Third-party accessibility tools

    • Universal design principles

    • Specialized adaptive technologies

  • Evaluation Factors:

    • Legal requirements and compliance

    • Cost/benefit considerations

    • User testing methodologies

    • Cultural and contextual factors


Sample Exam Questions:

  1. Evaluate the effectiveness of current approaches to making digital interfaces accessible to users with visual impairments. [8 marks]

    • Response Tips for Top Marks:

      • Consider multiple approaches (screen readers, voice interfaces, haptic feedback)

      • Evaluate based on clear criteria (effectiveness, cost, user experience)

      • Include specific examples of both successful and problematic implementations

      • Consider technical limitations and trade-offs

      • Reach a nuanced conclusion that acknowledges progress while identifying remaining challenges


  2. Discuss the tensions between aesthetic design trends and accessibility requirements in modern interfaces. [8 marks]

    • Response Tips for Top Marks:

      • Identify specific design trends that create accessibility challenges

      • Consider multiple stakeholder perspectives (designers, users, platform owners)

      • Provide concrete examples of both conflicts and successful compromises

      • Consider how universal design principles can address these tensions

      • Develop a balanced discussion that recognizes legitimate concerns on all sides


  3. To what extent should operating system developers be responsible for ensuring digital accessibility rather than application developers? [12 marks]

    • Response Tips for Top Marks:

      • Develop a framework for analyzing responsibility allocation

      • Consider technical, economic, and ethical dimensions of the question

      • Provide specific examples of current practices across different platforms

      • Evaluate the effectiveness of different approaches

      • Consider the implications for different stakeholders

      • Reach a substantiated conclusion that directly addresses the question

      • Demonstrate awareness of how this issue fits into broader digital inclusion debates


3.2 Software Security Challenges

Research Task: Evaluate current challenges in software security and malware protection.


Essential Elements to Include:

  • Threat Landscape:

    • Common malware types and attack vectors

    • Emerging threats and techniques

    • Target prioritization and motivations

    • Geographic and sectoral variations

  • Protection Approaches:

    • Operating system security models

    • Application sandboxing and permissions

    • Anti-malware technologies

    • User education and practices

  • Systemic Challenges:

    • Security economics and incentives

    • Update cycles and vulnerability management

    • Balance between security and usability

    • Privacy implications of security measures


Sample Exam Questions:

  1. Evaluate the effectiveness of current approaches to malware protection for personal computing devices. [8 marks] Response Tips for Top Marks:

    • Consider multiple protection methods (antivirus, sandboxing, permissions)

    • Evaluate using clear criteria (detection rates, performance impact, usability)

    • Discuss limitations and blind spots of current approaches

    • Support with specific examples of both successes and failures

    • Consider the balance between technical solutions and user behaviour


  2. Discuss how the economics of software development influences security practices in digital society. [8 marks]

    • Response Tips for Top Marks:

      • Consider incentive structures for different stakeholders

      • Analyze the "market for lemons" problem in security

      • Discuss specific examples where economic factors affected security outcomes

      • Consider regulatory and market-based approaches to aligning incentives

      • Demonstrate understanding of security as both technical and economic issue


  3. To what extent has increased operating system security created a false sense of security for users in digital society? [12 marks]

    • Response Tips for Top Marks:

      • Define clear evaluation criteria for "false sense of security"

      • Analyse specific security improvements in modern operating systems

      • Consider changing threat landscapes and adaptation by attackers

      • Evaluate user understanding and behaviour in response to security messaging

      • Use specific examples of security successes and failures

      • Consider different perspectives (security professionals, average users)

      • Develop a nuanced conclusion that addresses different aspects of the question


3.3 Computing Applications Case Studies

Research Task: Analyse case studies of computer applications in different fields to evaluate impacts.


Essential Elements to Include:

  • Fields for Case Studies:

    • Healthcare computing

    • Financial technology

    • Educational technology

    • Creative industries computing

    • Scientific and research computing

  • Analysis Factors:

    • Technological implementation details

    • Organizational and workflow impacts

    • Ethical and societal implications

    • Success factors and challenges

    • Future development trajectories


Sample Exam Questions:

  1. Evaluate the impact of modern computing systems on healthcare delivery and patient outcomes. [8 marks]

    • Response Tips for Top Marks:

      • Consider multiple computing applications in healthcare

      • Establish clear criteria for evaluating "impact" (efficiency, accuracy, accessibility)

      • Provide specific examples with evidence of outcomes

      • Consider both benefits and challenges/problems

      • Acknowledge contextual factors (geography, resource availability)

      • Reach a balanced conclusion based on the evidence presented


  2. Discuss how computing applications in financial technology are changing relationships between individuals and financial institutions. [8 marks]

    • Response Tips for Top Marks:

      • Consider multiple dimensions of the relationship (access, control, trust)

      • Discuss specific fintech innovations and their mechanisms

      • Consider both empowering and potentially problematic aspects

      • Address differential impacts across demographic groups

      • Develop a balanced discussion that acknowledges complexity


  3. To what extent has the integration of computing in educational settings transformed learning outcomes rather than simply digitizing traditional practices? [12 marks]

    • Response Tips for Top Marks:

      • Define clear criteria for distinguishing transformation from digitization

      • Analyze specific educational computing implementations across different contexts

      • Consider evidence of learning outcomes from research

      • Evaluate the role of pedagogical approaches versus technology itself

      • Consider different stakeholder perspectives

      • Address issues of access and digital divides

      • Reach a substantiated conclusion that directly engages with the question

      • Consider how educational computing might evolve to better support transformation


THE FUTURE: Emerging Technologies & Concepts

Level 1: Essentials (Time-Poor Students - Night Before) [AO1]

1.1 Next-Generation Computing Overview

Research Task: Create a concise reference chart of emerging computing technologies.


Essential Elements to Include:

  • Post-Moore's Law Computing Approaches:

    • 3D chip stacking and advanced materials

    • Specialized processing architectures (AI accelerators, quantum-inspired)

    • Edge computing and distributed architectures

  • Architectural Innovations:

    • Neuromorphic computing principles

    • Optical computing fundamentals

    • Biological computing concepts


Sample Exam Questions:

  • Define the term "neuromorphic computing" as used in discussions of future computing. [2 marks]

  • State two approaches being developed to continue computing advancement beyond Moore's Law. [2 marks]

  • Identify three emerging computing architecture types that differ from traditional von Neumann design. [3 marks]

  • Outline the basic principles of edge computing as an emerging computing approach. [4 marks]


1.2 Quantum Computing Fundamentals

Research Task: Create a visual explanation of quantum computing basics.


Essential Elements to Include:

  • Key Quantum Principles:

    • Superposition and quantum bits (qubits)

    • Entanglement and quantum advantage

    • Quantum gates versus classical logic

  • Current State of Development:

    • Major technological approaches (superconducting, trapped ion, etc.)

    • Current qubit counts and stability challenges

    • Notable quantum computing systems and companies

  • Potential Application Areas:

    • Cryptography and security implications

    • Complex simulation capabilities

    • Optimization problems


Sample Exam Questions:

  • Define "quantum superposition" as it relates to quantum computing. [2 marks]

  • State two major technological approaches currently being used to develop quantum computers. [2 marks]

  • Identify three potential application areas where quantum computing may offer significant advantages. [3 marks]

  • Describe the fundamental difference between quantum bits and classical bits. [4 marks]


Level 2: Exploration (3-9 Hours of Study) [AO2]

2.1 Alternative Computing Architectures

Research Task: Research and analyse emerging computing architectures beyond traditional designs.


Essential Elements to Include:

  • Neuromorphic Computing:

    • Brain-inspired design principles

    • Current implementations and projects

    • Potential applications and advantages

  • Optical Computing:

    • Principles and potential advantages

    • Current development challenges

    • Hybrid optical-electronic approaches

  • Biological Computing:

    • DNA computing principles

    • Organic computing approaches

    • Wetware and bioelectronic interfaces


Sample Exam Questions:

  • Explain two ways that neuromorphic computing architectures differ from traditional von Neumann architectures. [4 marks]

  • Explain how optical computing might overcome limitations of electronic computing. [4 marks]

  • Compare quantum computing and neuromorphic computing in terms of their potential applications and current limitations. [6 marks]

  • Examine how post-Moore's Law computing approaches might affect the future development of digital society. [6 marks]


2.2 AI Integration in Computing Systems

Research Task: Analyze how AI technologies are being integrated into computing systems.


Essential Elements to Include:

  • Hardware-Level Integration:

    • AI accelerator chips and neural processing units

    • On-device AI processing trends

    • Energy efficiency considerations

  • System-Level Integration:

    • AI-enhanced operating systems

    • Adaptive and predictive computing

    • Security and privacy implications

  • Development Approaches:

    • Specialised AI frameworks and tools

    • Hardware-software co-design

    • Edge AI versus cloud AI processing


Sample Exam Questions:

  • Explain two ways that specialised AI hardware differs from general-purpose computing hardware. [4 marks]

  • Explain how on-device AI processing affects privacy compared to cloud-based AI processing. [4 marks]

  • Compare the advantages and limitations of AI acceleration at the hardware level versus the software level. [6 marks]

  • Examine how the integration of AI into operating systems might change user interactions with computers. [6 marks]


2.3 Future Interface Paradigms

Research Task: Research emerging interface technologies and their potential impacts.


Essential Elements to Include:

  • Brain-Computer Interfaces:

    • Non-invasive versus invasive approaches

    • Current capabilities and limitations

    • Potential applications and ethical considerations

  • Ambient Computing:

    • Context-aware systems

    • Disappearing interfaces concept

    • Smart environment integration

  • Extended Reality:

    • Advanced AR/VR/MR technologies

    • Haptic and multi-sensory feedback

    • Spatial computing concepts


Sample Exam Questions:

  • Explain two significant challenges in developing practical brain-computer interfaces. [4 marks]

  • Explain how ambient computing differs from traditional computing interfaces. [4 marks]

  • Compare the potential impacts of advanced haptic interfaces and visual interfaces on human-computer interaction. [6 marks]

  • Examine how future interface paradigms might affect accessibility for users with different abilities. [6 marks]


Level 3: Deep Dive (Expert Level) [AO3]

3.1 Computing Ethics in Future Technologies

Research Task: Evaluate ethical implications of emerging computing technologies.


Essential Elements to Include:

  • Key Ethical Dimensions:

    • Privacy and surveillance implications

    • Agency and autonomy considerations

    • Access and digital divide concerns

    • Cognitive and psychological impacts

  • Governance Approaches:

    • Regulatory frameworks and challenges

    • Industry self-regulation efforts

    • Technical solutions to ethical problems

  • Stakeholder Perspectives:

    • Developer responsibilities

    • User rights and protections

    • Societal and collective interests


Sample Exam Questions:

  1. Evaluate the ethical implications of brain-computer interfaces for privacy and personal autonomy. [8 marks]

    • Response Tips for Top Marks:

      • Consider different types of BCIs and their varying implications

      • Establish clear criteria for evaluating ethical implications

      • Consider both potential benefits and risks

      • Examine tensions between individual and collective interests

      • Consider different cultural and philosophical perspectives

      • Reach a nuanced conclusion that acknowledges complexity


  2. Discuss the responsibility of computer scientists and engineers in addressing ethical concerns in quantum computing development. [8 marks]

    • Response Tips for Top Marks:

      • Consider multiple dimensions of responsibility (technical, social, professional)

      • Analyze specific ethical challenges unique to quantum computing

      • Consider different stakeholder perspectives

      • Discuss practical approaches to responsible development

      • Reference relevant ethical frameworks or principles

      • Develop a balanced discussion that acknowledges both individual and institutional responsibilities


3.2 Computing Sustainability Analysis

Research Task: Evaluate the environmental impacts and sustainability challenges of future computing.


Essential Elements to Include:

  • Environmental Impacts:

    • Energy consumption projections

    • Material resource requirements

    • Electronic waste considerations

    • Data center evolution

  • Sustainability Approaches:

    • Energy-efficient computing

    • Circular economy for electronics

    • Alternative materials research

    • Carbon-aware computing

  • Systemic Considerations:

    • Computing's role in broader sustainability

    • Economic factors and incentives

    • Policy and regulatory approaches

    • Innovation directions and investments


Sample Exam Questions:

  1. Evaluate the potential of emerging computing technologies to address their own environmental impacts. [8 marks]

    • Response Tips for Top Marks:

      • Consider multiple technologies and their varying environmental profiles

      • Establish clear criteria for evaluating effectiveness

      • Analyze trade-offs between performance and sustainability

      • Consider systemic factors beyond just technical solutions

      • Reach a balanced conclusion that acknowledges both progress and continuing challenges


  2. To what extent might quantum computing contribute to or detract from computing sustainability goals? [12 marks]

    • Response Tips for Top Marks:

      • Define clear criteria for sustainability in this context

      • Analyze both energy requirements and potential efficiency gains

      • Consider direct impacts of quantum hardware and indirect impacts through applications

      • Evaluate different timeframes (near-term, long-term)

      • Consider different perspectives and scenarios

      • Support arguments with current research and development trends

      • Reach a substantiated conclusion that addresses multiple dimensions of the question


3.3 Societal Transformation Analysis

Research Task: Synthesize how emerging computing technologies might transform digital society.


Essential Elements to Include:

  • Transformation Dimensions:

    • Work and economic structures

    • Education and knowledge systems

    • Governance and civic participation

    • Social relationships and communities

  • Critical Uncertainties:

    • Access and inequality implications

    • Power concentration versus democratization

    • Adaptation and transition challenges

    • Human-centered versus technology-driven futures

  • Agency and Direction:

    • Shaping technology development

    • Anticipatory governance approaches

    • Collective versus individual choices

    • Values-based design and development


Sample Exam Questions:

  1. Discuss how quantum computing might transform the relationship between states and citizens in digital society. [8 marks]

    • Response Tips for Top Marks:

      • Consider multiple aspects of state-citizen relationships

      • Analyze specific capabilities of quantum computing that could impact these relationships

      • Consider both empowering and concerning potential developments

      • Discuss implications for privacy, security, and power dynamics

      • Develop a balanced discussion that acknowledges complexity and uncertainty


  2. To what extent will emerging computing technologies address or exacerbate existing digital divides? [12 marks]

    • Response Tips for Top Marks:

      • Define clear criteria for evaluating "digital divides"

      • Consider multiple emerging technologies and their varying implications

      • Analyze both technical capabilities and socioeconomic factors

      • Evaluate potential scenarios with supporting evidence

      • Consider different geographical and demographic contexts

      • Acknowledge areas of uncertainty and competing perspectives

      • Reach a nuanced conclusion that directly addresses the question

      • Consider implications for policy and governance



SUPPLEMENTAL: Six Compelling Computing Case Studies

This supplemental section provides six real-world case studies across the timeline of computing evolution. Each case study offers a jumping-off point for deeper exploration and connects multiple aspects of the curriculum. These examples can enrich your understanding, provide concrete illustrations of abstract concepts, and offer excellent material for exam responses.


PAST: Historical Case Studies

1. ENIAC and the Women Programmers (1945-1946)

Overview: The Electronic Numerical Integrator and Computer (ENIAC), often cited as the first general-purpose electronic computer, was programmed by a team of six women mathematicians who received little recognition at the time.


Key Exploration Points:

  • How Betty Holberton, Jean Jennings, Kathleen McNulty, Marlyn Meltzer, Frances Spence, and Ruth Teitelbaum programmed ENIAC without modern tools or programming languages

  • The physical nature of early programming (manipulating cables and switches)

  • The invisibility of women's contributions in early computing history

  • How programming evolved from "women's work" to a male-dominated field


Why It Matters: This case challenges conventional narratives about computing history, illustrates the nature of first-generation computing, and raises important questions about recognition and gender in technology development.

Exam Connection: Valuable for discussions of computing history, programming evolution, and societal aspects of technology development.


2. IBM System/360: The Bet-the-Company Gamble (1964-1965)

Overview: IBM's development of the System/360 mainframe family represented a $5 billion investment (equivalent to over $40 billion today) and a complete reimagining of computer architecture that created the concept of a compatible family of computers.


Key Exploration Points:

  • The revolutionary concept of compatible computer systems across different performance levels

  • The massive scale of the project (over 60,000 people involved)

  • The technical innovations (microcode, standard interfaces)

  • The business risk and market impact


Why It Matters: The System/360 project created architectural concepts still present in modern computing, demonstrated the scale possible in computing projects, and showed how business decisions shape technological evolution.


Exam Connection: Excellent for exploring third-generation computing, the evolution of business computing, and the relationship between technology and business strategy.


PRESENT: Contemporary Case Studies

3. Apple Silicon Transition: Vertical Integration in Modern Computing (2020-2023)

Overview: Apple's transition from Intel processors to its own custom-designed ARM-based chips represents one of the most significant architectural shifts in personal computing in decades, with profound implications for performance, power efficiency, and industry structure.


Key Exploration Points:

  • The technical architecture of Apple's M-series chips (unified memory, system-on-chip design)

  • The business strategy of vertical integration (controlling both hardware and software)

  • The performance and power efficiency advantages demonstrated

  • The implications for the semiconductor and personal computing industries


Why It Matters: This case illustrates modern processor design philosophy, the continuing evolution of personal computing, and shows how architectural decisions influence user experience and capabilities.


Exam Connection: Valuable for discussing modern computer components, system architecture, performance considerations, and the relationships between hardware and software.


4. TensorFlow: The Democratisation of AI Computing (2015-Present)

Overview: Google's release of TensorFlow as an open-source machine learning framework in 2015 dramatically accelerated the democratisation of AI development, enabling a much broader range of developers and organisations to implement machine learning solutions.


Key Exploration Points:

  • How TensorFlow abstracts complex mathematical operations for AI

  • The ecosystem of hardware accelerators (TPUs, GPUs) designed for TensorFlow

  • The tension between open-source software and proprietary hardware optimization

  • The impact on AI application development across industries


Why It Matters: This case demonstrates how software frameworks can reshape computing capabilities, the relationship between open-source and commercial interests, and how abstraction layers enable technological democratization.


Exam Connection: Excellent for examining the relationship between hardware and software, specialized computing architectures, and how computing tools shape technology accessibility.


FUTURE: Emerging Case Studies

5. IBM Quantum Computing: From Theory to Commercial Reality (2016-Present)

Overview: IBM's quantum computing program has evolved from theoretical research to cloud-accessible quantum computers with more than 100 qubits, offering a window into how emerging computing paradigms move from research to practical implementation.


Key Exploration Points:

  • The technical approach of IBM's superconducting qubit technology

  • The creation of Qiskit programming framework to make quantum computing accessible

  • The quantum computing ecosystem developed around IBM's technology

  • The practical challenges of scaling quantum computing (error correction, stability)


Why It Matters: This case provides concrete insights into the current state of quantum computing development, the challenges of new computing paradigms, and how companies approach long-term technological innovation.


Exam Connection: Valuable for discussions of quantum computing, post-Moore's Law approaches, and the relationship between theoretical concepts and practical implementation.


6. Neuralink: The Future of Brain-Computer Interfaces (2016-Present)

Overview: Elon Musk's Neuralink is developing ultra-high-bandwidth brain-machine interfaces, with potential applications from treating neurological conditions to enabling new forms of human-computer interaction, raising profound technical, ethical, and societal questions.


Key Exploration Points:

  • The technical approach of Neuralink's implantable device

  • The medical applications versus enhancement possibilities

  • The ethical considerations around brain-computer interfaces

  • The regulatory challenges and public perception issues


Why It Matters: This case illustrates the frontier of computing interfaces, raises important ethical questions about technology and humanity, and demonstrates how computing increasingly interfaces directly with human biology.


Exam Connection: Excellent for exploring future interface paradigms, ethical implications of computing technology, and the boundaries between humans and machines in digital society.


Research Guidance for Case Studies

How to Use These Case Studies

  1. Choose Based on Interest: Select case studies that genuinely interest you or connect to aspects of computing you want to explore further.

  2. Research in Depth: For each case study, go beyond the brief overview provided here:

    • Find primary sources where possible (technical documents, interviews with participants)

    • Look for multiple perspectives on the significance and impact

    • Identify concrete technical details that illustrate key concepts

    • Consider critical viewpoints and limitations

  3. Make Connections: The most valuable aspect of these case studies is their ability to connect multiple curriculum areas:

    • Identify technical concepts illustrated by the case

    • Consider business and economic factors involved

    • Analyse societal and ethical implications

    • Examine historical context or future implications

  4. Prepare for Application: Rather than memorising details, understand the key principles and dynamics illustrated by each case, so you can apply them to exam questions.


Suggested Research Sources

For Historical Cases:

  • Computer History Museum (computerhistory.org)

  • IEEE Annals of the History of Computing

  • Oral histories and interviews with computing pioneers


For Contemporary Cases:

  • Technical documentation from companies involved

  • Academic analysis in computer science journals

  • Industry analysis from reputable technology publications


For Future-Oriented Cases:

  • Company research publications and technical papers

  • Scientific journals in relevant fields

  • Ethics and policy papers from academic and think tank sources


By exploring these case studies in depth, you'll develop a richer understanding of computing's evolution and be able to draw on concrete examples in your exam responses, moving beyond abstract concepts to demonstrate how computing actually works in the real world.



3.3 Computers: Key Words, Definitions & Examples


Core Concept

Computer: A machine that automatically executes sets of instructions to perform specific tasks.

Examples:

  1. Desktop computers that run operating systems like Windows or macOS

  2. Smartphones running iOS or Android operating systems

  3. Smart TVs executing instructions to stream content and run applications


3.3A Types of Computers

Mainframe: Large, powerful computers designed to handle high volumes of data processing for critical applications in large organizations.

Examples:

  • IBM z16 mainframes used by major banks for processing millions of financial transactions daily

  • Bull Sequana mainframes used by government agencies for census data processing

  • Fujitsu PRIMEHUB mainframes used by airlines for reservation systems

  • IBM Watson supercomputer that combines advanced hardware with AI software for complex data analysis and natural language processing


Server: Computers that provide services or resources to other computers (clients) over a network.

Examples:

  • Dell PowerEdge servers hosting company websites and databases

  • Amazon Web Services (AWS) cloud servers running web applications

  • Microsoft Azure servers providing cloud computing services to businesses


Personal Computer: General-purpose computers designed for individual use.

Examples:

  • Dell XPS desktop computers for home and office use

  • Apple MacBook Pro laptops for professional work

  • HP Pavilion desktop systems for general computing tasks


Tablet: Portable touchscreen computers that are larger than smartphones but smaller than laptops.

Examples:

  • Apple iPad Pro with the Apple Pencil for digital art

  • Samsung Galaxy Tab for media consumption and light productivity

  • Microsoft Surface Pro combining tablet and laptop functionality


Smart/Mobile Device: Portable computing devices primarily used for communication and accessing mobile applications.

Examples:

  • Apple iPhone running iOS with various applications

  • Samsung Galaxy phones running Android operating system

  • Google Pixel smartphones with integrated Google services


Wearable Computers and Devices: Computing devices designed to be worn on the body.

Examples:

  • Apple Watch tracking health metrics and providing notifications

  • Fitbit fitness trackers monitoring physical activity

  • Oura Ring tracking sleep patterns and health data


3.3B Components of a Computer

Hardware

Motherboard: The main circuit board that connects all components of a computer system.

Examples:

  • ASUS ROG Gaming motherboards with specialized cooling systems

  • Gigabyte Aorus motherboards for high-performance computing

  • MSI motherboards with integrated Wi-Fi capabilities


Central Processing Unit (CPU): The primary component that executes instructions and processes data.

Examples:

  • Intel Core i9 processors used in high-performance computers

  • AMD Ryzen processors for gaming and content creation

  • Apple M2 chips in MacBooks and iPads


Memory (RAM): Temporary storage that holds data and instructions being actively used by the CPU.

Examples:

  • Corsair Vengeance DDR4 RAM modules for gaming PCs

  • Kingston HyperX memory for workstations

  • Crucial RAM modules for server systems


Storage: Components that store data and programs permanently.

Examples:

  • Samsung 980 PRO NVMe solid-state drives for fast data access

  • Western Digital Black hard disk drives for mass storage

  • Seagate Portable external drives for backup storage


Graphics and Sound Components: Hardware that processes and outputs visual and audio data.

Examples:

  • NVIDIA GeForce RTX 4090 graphics cards for gaming and rendering

  • AMD Radeon GPUs for video editing and graphics work

  • Creative Sound Blaster sound cards for audio production


Power Supply: Component that converts electrical power to appropriate voltages for computer components.

Examples:

  • Corsair RM850x power supply units for gaming computers

  • EVGA SuperNOVA power supplies for workstations

  • Seasonic PRIME power supplies for servers


Input and Output Devices: Hardware that allows users to input data and receive output from the computer.

Examples:

  • Logitech MX Master mice and mechanical keyboards for input

  • Dell UltraSharp monitors for visual output

  • Epson EcoTank printers for document output


Sensors: Hardware components that detect and respond to physical stimuli.

Examples:

  • iPhone's LiDAR scanner for depth sensing in augmented reality

  • Ambient light sensors in laptops that adjust screen brightness

  • Accelerometers in smartphones that detect orientation changes


Interfaces

User Interfaces: Methods through which users interact with computer systems.

  • Graphical User Interface (GUI) Examples:

    • Microsoft Windows 11 with its visual desktop environment

    • macOS Ventura with intuitive visual controls and windows

    • Android Material Design interface on smartphones

  • Haptic Interface Examples:

    • iPhone's Taptic Engine providing touch feedback

    • PlayStation DualSense controller with adaptive triggers and vibration

    • Logitech gaming mice with customizable force feedback


Software

  1. Operating System Software: Core software that manages computer hardware and provides services for applications.

    • Examples:

      • Microsoft Windows 11 for personal computers

      • Linux Ubuntu for servers and open-source computing

      • iOS for Apple mobile devices

  2. Software Applications: Programs that enable users to perform specific tasks.

    • Examples:

      • Microsoft Office 365 suite for productivity

      • Adobe Creative Cloud for design and media production

      • Autodesk AutoCAD for computer-aided design

  3. Apps: Software applications specifically designed for mobile devices.

    • Examples:

      • Instagram for social media photo sharing

      • Uber for ride-sharing services

      • Duolingo for language learning on mobile devices

  4. Malicious Software: Software designed to damage, disrupt, or gain unauthorized access to computer systems.

    • Examples:

      • Ransomware like WannaCry that encrypts files and demands payment

      • Trojans like Zeus that steal banking information

      • Spyware programs that track user activity without consent


3.3C Uses and Forms of Computer Coding

Computer Coding and Programming: The process of creating instructions for computers using specific languages and rules.


High-Level Programming Languages: High-level programming languages are programming languages designed to be more accessible to human programmers by using syntax and structures that are closer to natural human language and abstract concepts, rather than the binary machine code that computers directly execute. These languages hide the complexity of the underlying hardware and provide features that make coding more intuitive and efficient.

Examples:

  • Python used for data science and web development

  • JavaScript powering interactive websites

  • Java used for enterprise applications and Android development


Low-Level Programming Languages: Low-level programming languages are programming languages that provide little or no abstraction from a computer's instruction set architecture. These languages closely correspond to the machine code instructions that are directly executed by the computer's central processing unit (CPU) and require detailed knowledge of hardware architecture.

Examples:

  • Assembly language used for firmware development

  • C programming language for operating system development

  • CUDA for direct GPU programming


Markup Languages: Markup languages are systems for annotating text documents in a way that is syntactically distinguishable from the text itself. They use tags or markers to define the structure, formatting, or semantic meaning of content, but unlike programming languages, they don't contain algorithms or processing logic.

Examples:

  • HTML defining the structure of web pages

  • XML used for data interchange between applications

  • Markdown used for formatting documentation


3.3D Evolution of Computing

Generations in Computing:

  • First Generation (1940s-1950s): Vacuum tube-based computers

    • Examples:

      • ENIAC used for calculating artillery firing tables

      • UNIVAC I for processing the U.S. Census

  • Second Generation (1950s-1960s): Transistor-based computers

    • Examples:

      • IBM 1401 for business data processing

      • DEC PDP-1 for scientific applications

  • Third Generation (1960s-1970s): Integrated circuit-based computers

    • Examples:

      • IBM System/360 mainframe series

      • DEC PDP-11 minicomputers

  • Fourth Generation (1970s-Present): Microprocessor-based computers

    • Examples:

      • Apple Macintosh introducing graphical user interfaces to consumers

      • IBM PC establishing the personal computer standard

  • Fifth Generation (Present and Future): AI and parallel processing

    • Examples:

      • IBM Watson, which famously defeated human champions on Jeopardy! in 2011 and is now used in healthcare diagnostics, business intelligence, and customer service

      • Neural processors in smartphones for machine learning tasks


Moore's Law: The observation that the number of transistors in a dense integrated circuit doubles approximately every two years, leading to exponential growth in computing power.

Examples:

  • Evolution from Intel 8086 processor (29,000 transistors) to modern processors with billions of transistors

  • Smartphone processing power exceeding that of NASA's Apollo guidance computers by orders of magnitude

  • Graphics processing units (GPUs) doubling computational capabilities approximately every 18 months


Emerging Areas of Computing:

Cognitive Computing: Systems that learn at scale, reason with purpose, and interact with humans naturally.

Examples:

  • IBM Watson in healthcare helping doctors diagnose diseases and recommend treatments by analyzing millions of medical documents

  • IBM Watson Discovery analyzing unstructured data to find patterns and insights for businesses

  • IBM Watson Assistant providing natural language interaction for customer service applications


Quantum Computing: Computing using quantum phenomena such as superposition and entanglement.

Examples:

  • IBM Quantum computers available through cloud services

  • Google's Sycamore processor demonstrating quantum supremacy

  • D-Wave quantum annealing systems solving optimization problems


Neuromorphic Computing: Computing designed to mimic the human brain's neural structure.

Examples:

  • Intel's Loihi neuromorphic research chip

  • IBM's TrueNorth processor for neural network applications

  • BrainChip's Akida neuromorphic processor for edge AI applications


DNA Computing: Computing using biochemical reactions and DNA molecules.

Examples:

  • Microsoft's research into DNA data storage systems

  • University of Washington's DNA-based information storage experiments

  • CATALOG's DNA data storage technology for archival purposes



3.3 Computers - Key Terms with Characteristics and Advantages/Disadvantages

Computer

Characteristics:

  • Processes instructions automatically

  • Operates using binary system (0s and 1s)

  • Requires both hardware and software components

  • Can store and retrieve data

  • Executes tasks with precision and speed

Advantages:

  • Performs complex calculations quickly

  • Stores large amounts of data efficiently

  • Automates repetitive tasks

  • High accuracy in task execution

  • Multitasking capabilities

Disadvantages:

  • Requires electricity/power to function

  • No true intelligence or original thinking

  • Vulnerable to security threats/malware

  • Can become obsolete quickly

  • Initial cost and maintenance expenses


Types of Computers

Mainframe

Characteristics:

  • Extremely large processing capacity

  • Handles millions of transactions simultaneously

  • Centralized computing architecture

  • Enhanced reliability and fault tolerance

  • Specialized cooling and power requirements

Advantages:

  • Exceptional processing power for large-scale applications

  • High reliability with redundant components

  • Ability to serve hundreds/thousands of users

  • Advanced security features

  • Long operational lifespan

Disadvantages:

  • Very expensive to purchase and maintain

  • Requires specialized knowledge to operate

  • Physically large and power-intensive

  • Less flexibility than distributed systems

  • Complex to upgrade


Server

Characteristics:

  • Designed to provide services to other computers

  • Runs continuously with minimal downtime

  • Higher specifications than personal computers

  • Network-oriented architecture

  • Often runs specialized operating systems

Advantages:

  • Centralized data storage and management

  • Enables resource sharing across networks

  • Scalable to meet increasing demands

  • Supports multiple users simultaneously

  • Enhanced security controls

Disadvantages:

  • More expensive than personal computers

  • Requires technical expertise to maintain

  • Single point of failure risk

  • Higher power consumption

  • Needs physical security protections


Personal Computer

Characteristics:

  • Designed for individual use

  • Self-contained unit with input/output devices

  • General-purpose usage capabilities

  • Desktop or laptop form factors

  • Consumer-oriented specifications

Advantages:

  • Affordable for individual users

  • Versatile for multiple applications

  • Easily customizable and upgradable

  • User-friendly interfaces

  • Widely available support and software

Disadvantages:

  • Limited processing power compared to larger systems

  • Security vulnerabilities

  • Shorter lifecycle than enterprise systems

  • Limited multi-user capabilities

  • Performance degrades over time


Tablet

Characteristics:

  • Portable touchscreen interface

  • Simplified operating system

  • App-based software ecosystem

  • Integrated wireless connectivity

  • Battery-powered operation

Advantages:

  • Highly portable and lightweight

  • Intuitive touch interface

  • Long battery life

  • Instant-on functionality

  • Suitable for content consumption

Disadvantages:

  • Limited processing power

  • Restricted multitasking capabilities

  • Difficult to repair or upgrade

  • Less suitable for content creation

  • Screen size constraints


Smart/Mobile Device

Characteristics:

  • Handheld form factor

  • Cellular and wireless connectivity

  • App-based functionality

  • Integrated sensors (GPS, accelerometer, etc.)

  • Always-on capabilities

Advantages:

  • Extreme portability

  • Always connected to networks

  • Combines multiple tools (phone, camera, etc.)

  • Location-aware services

  • Personal customization options

Disadvantages:

  • Small screen size

  • Limited battery life

  • Storage constraints

  • Vulnerability to damage

  • Privacy concerns with constant connectivity


Wearable Computers and Devices

Characteristics:

  • Designed to be worn on the body

  • Minimal user interface

  • Specialized for specific functions

  • Sensor-rich design

  • Low power consumption

Advantages:

  • Hands-free operation

  • Continuous health/activity monitoring

  • Contextual awareness

  • Augments natural human capabilities

  • Seamless integration into daily life

Disadvantages:

  • Very limited computational power

  • Restricted input methods

  • Short battery life

  • Often dependent on companion devices

  • Privacy concerns with constant data collection


Components of a Computer

Hardware Motherboard

Characteristics:

  • Main circuit board in the computer

  • Contains sockets for CPU, RAM, and expansion cards

  • Includes buses for data transfer

  • Houses the BIOS/UEFI firmware

  • Connects all hardware components

Advantages:

  • Centralized connection point for all components

  • Standardized form factors for compatibility

  • Enables component communication

  • Modular design for upgrades

  • Supports various peripheral interfaces

Disadvantages:

  • Single point of failure

  • Limited upgrade path once installed

  • Damage can affect entire system

  • Form factor constrains system design

  • Complex troubleshooting


Central Processing Unit (CPU)

Characteristics:

  • Primary computing engine of the system

  • Contains arithmetic logic unit and control unit

  • Measured in GHz of clock speed

  • Multiple cores for parallel processing

  • Includes cache memory for fast data access

Advantages:

  • Executes instructions at high speed

  • Handles multiple tasks simultaneously (with multi-core)

  • Advanced instruction sets for specialized functions

  • Power management features

  • Continually improving performance

Disadvantages:

  • Generates significant heat

  • Power intensive

  • Expensive to upgrade

  • Performance bottlenecks other components

  • Vulnerable to physical and security threats


Memory (RAM)

Characteristics:

  • Volatile temporary storage

  • Directly accessible by CPU

  • Measured in GB capacity

  • Various speeds and types (DDR4, DDR5, etc.)

  • Provides working space for active programs

Advantages:

  • Extremely fast data access

  • Enables multitasking capabilities

  • Directly improves system responsiveness

  • No moving parts (reliability)

  • Relatively easy to upgrade in many systems

Disadvantages:

  • Volatile (data lost when powered off)

  • Limited capacity compared to storage

  • Relatively expensive per GB

  • Fixed maximum capacity on motherboards

  • Sensitive to static electricity


Storage

Characteristics:

  • Non-volatile data retention

  • Higher capacity than RAM

  • Various technologies (HDD, SSD, NVMe)

  • Measured in GB or TB

  • Houses operating system and user files

Advantages:

  • Retains data when powered off

  • Large capacity at reasonable cost

  • Portable between systems (external options)

  • Can be expanded significantly

  • Various options for different needs

Disadvantages:

  • Slower than RAM

  • Mechanical drives (HDD) have moving parts that can fail

  • Limited read/write lifecycle (especially SSDs)

  • Security vulnerabilities for sensitive data

  • Data corruption risks


Graphics and Sound Components

Characteristics:

  • Specialized processors for visual/audio output

  • Contains dedicated memory (VRAM)

  • Handles encoding/decoding of media

  • Various output interfaces (HDMI, DisplayPort)

  • Can be integrated or discrete

Advantages:

  • Offloads specialized processing from CPU

  • Enables high-quality media playback

  • Essential for gaming and creative work

  • Supports multiple displays

  • Accelerates specific computational tasks

Disadvantages:

  • High-performance versions are expensive

  • Consume significant power

  • Generate substantial heat

  • Regular driver updates required

  • Limited upgrade options in many systems


Power Supply

Characteristics:

  • Converts AC to various DC voltages

  • Various wattage ratings

  • Includes cooling fan

  • Provides stable power to all components

  • Includes protection circuits

Advantages:

  • Provides stable, clean power to sensitive components

  • Protection against power surges

  • Modular options for cable management

  • Various efficiency ratings available

  • Redundant options for critical systems

Disadvantages:

  • Single point of failure

  • Generates heat

  • Can be noisy

  • Efficiency decreases over time

  • Quality units are expensive


Input and Output Devices

Characteristics:

  • Enable human-computer interaction

  • Convert physical actions to digital signals (input)

  • Convert digital signals to human-perceivable output

  • Connected via various interfaces (USB, Bluetooth)

  • Range from simple to complex

Advantages:

  • Enable user interaction with the system

  • Multiple options for different needs

  • Increasingly wireless capabilities

  • Specialized devices for specific tasks

  • Accessible options for different abilities

Disadvantages:

  • Additional points of failure

  • Regular replacement often necessary

  • Compatibility issues with some systems

  • Security vulnerabilities (keyloggers, etc.)

  • Physical space requirements


Sensors

Characteristics:

  • Convert physical conditions to electrical signals

  • Various types for different measurements

  • Small size and low power consumption

  • Increasing precision and capabilities

  • Often integrated with other components

Advantages:

  • Enable context awareness in devices

  • Provide data about physical environment

  • Enable new interaction methods

  • Support automation and monitoring

  • Low cost for basic functionality

Disadvantages:

  • Privacy concerns with constant monitoring

  • Accuracy limitations

  • Calibration requirements

  • Additional power consumption

  • Software support complexities


User Interfaces

Characteristics:

  • Mediate between users and computer systems

  • Visual, audio, tactile interaction methods

  • Various complexity levels

  • Design principles focusing on usability

  • Evolving with technology capabilities

Advantages:

  • Make complex technology accessible to users

  • Hide underlying system complexity

  • Accommodate different user preferences

  • Provide feedback on system status

  • Improve overall user experience

Disadvantages:

  • Learning curve for new interfaces

  • Design compromises for different users

  • Can limit advanced functionality

  • Cultural assumptions in design

  • Accessibility challenges


Graphical User Interface (GUI)

Characteristics:

  • Visual interaction using windows, icons, menus

  • Mouse/touch driven navigation

  • Presents information visually

  • Includes visual feedback elements

  • Hierarchical organization of information

Advantages:

  • Intuitive for most users

  • Reduces learning curve

  • Visual representation aids understanding

  • Accommodates various languages

  • Supports multitasking visually

Disadvantages:

  • Screen space limitations

  • Resource intensive

  • Less efficient for some expert tasks

  • Accessibility issues for visually impaired

  • Design inconsistencies between applications


Haptic Interface

Characteristics:

  • Provides tactile feedback to users

  • Vibration, force feedback mechanisms

  • Simulates physical sensations

  • Enhances other interface methods

  • Increasingly precise capabilities

Advantages:

  • Adds physical dimension to digital interaction

  • Works when visual attention is limited

  • Enhances immersion in applications

  • Provides confirmation without looking

  • Accessibility benefits for some users

Disadvantages:

  • Limited vocabulary of sensations

  • Battery drain on mobile devices

  • Hardware requirements

  • Inconsistent implementation across devices

  • Can be distracting or uncomfortable


Operating System Software

Characteristics:

  • Manages hardware resources

  • Provides services to applications

  • Controls file systems and memory

  • Handles input/output operations

  • User interface and security management

Advantages:

  • Abstracts hardware complexity from users

  • Enables multitasking capabilities

  • Provides security architecture

  • Manages resource allocation

  • Standardizes application interfaces

Disadvantages:

  • Requires regular updates and maintenance

  • Security vulnerabilities

  • Resource overhead

  • Compatibility issues with some applications

  • Learning curve when switching systems


Software Applications

Characteristics:

  • Designed for specific tasks or functions

  • User-oriented interfaces

  • Various distribution methods

  • Regular update cycles

  • Range from simple to complex

Advantages:

  • Solves specific user problems

  • Increases productivity for specific tasks

  • Creates value from hardware investment

  • Increasingly cloud-connected

  • Offers specialized functionality

Disadvantages:

  • Cost of acquisition and maintenance

  • Learning curve for complex applications

  • Compatibility issues across platforms

  • Security risks

  • Dependency on vendor support


Apps

Characteristics:

  • Designed for mobile platforms

  • Streamlined, focused functionality

  • Distributed through app stores

  • Touch-optimized interfaces

  • Quick to launch and use

Advantages:

  • Optimized for mobile use cases

  • Simple installation and updates

  • Usually lower cost than desktop applications

  • Leverages device-specific features

  • Available anywhere with your device

Disadvantages:

  • Limited functionality compared to desktop equivalents

  • Privacy concerns with permissions

  • Subscription models increasingly common

  • Walled garden ecosystem limitations

  • Performance constraints on limited hardware


Malicious Software

Characteristics:

  • Designed to harm systems or steal data

  • Self-replicating or stealth capabilities

  • Various infection vectors

  • Increasingly sophisticated techniques

  • Financially or politically motivated

Advantages: (to attackers)

  • Can operate undetected

  • Exploits system vulnerabilities

  • Potential for significant damage

  • Difficult to completely remove

  • Evolves to avoid detection

Disadvantages: (to users)

  • Data loss or corruption

  • Privacy violations

  • System performance degradation

  • Financial costs to mitigate

  • Loss of trust in digital systems


Uses and Forms of Computer Coding

High-Level Programming Languages

Characteristics:

  • Abstracted from hardware details

  • Human-readable syntax

  • Extensive libraries and frameworks

  • Automated memory management

  • Portable across platforms

Advantages:

  • Easier to learn and understand

  • Faster development time

  • Fewer lines of code for same functionality

  • Better error handling and debugging

  • Cross-platform compatibility

Disadvantages:

  • Less efficient execution than low-level languages

  • Less control over system resources

  • Performance overhead

  • Dependency on language updates

  • May abstract important technical details


Low-Level Programming Languages

Characteristics:

  • Close to machine language

  • Direct hardware access

  • Minimal abstraction layers

  • Precise control over execution

  • Architecture-specific code

Advantages:

  • Maximum performance efficiency

  • Precise control over hardware

  • Smaller program size

  • Minimal runtime overhead

  • Essential for system programming

Disadvantages:

  • Steep learning curve

  • Time-consuming development

  • Difficult to debug and maintain

  • Prone to critical errors

  • Limited portability across platforms


Markup Languages

Characteristics:

  • Define document structure and formatting

  • Tag-based syntax

  • Declarative rather than procedural

  • Separate content from presentation

  • Hierarchical organization

Advantages:

  • Human and machine readable

  • Clear separation of content and presentation

  • Platform independent

  • Easily parsed and processed

  • Simplifies document structure

Disadvantages:

  • Limited functionality (no processing logic)

  • Verbose syntax compared to data formats

  • Can become complex with large documents

  • Various standards creating compatibility issues

  • Not suitable for algorithmic tasks


Evolution of Computing

Generations in Computing

Characteristics:

  • Defined by core technology changes

  • Significant increases in capability between generations

  • Decreasing physical size over generations

  • Increasing reliability and decreasing cost

  • Growing programming abstraction levels

Advantages:

  • Each generation offers significant improvements

  • Historical framework for understanding progress

  • Clear technological milestones

  • Demonstrates exponential growth pattern

  • Shows interdisciplinary nature of computing

Disadvantages:

  • Somewhat arbitrary dividing lines

  • Oversimplifies complex developmental processes

  • Focuses primarily on hardware evolution

  • Development is more continuous than discrete

  • Western-centric historical perspective


Moore's Law

Characteristics:

  • Observes transistor density doubling approximately every two years

  • Applied to processing power, memory capacity, and sensor capabilities

  • Originally an observation rather than a physical law

  • Has guided industry planning for decades

  • Approaching physical limits with current technology

Advantages:

  • Provided predictable roadmap for industry

  • Enabled long-term planning and investment

  • Driven continuous innovation

  • Created market expectations for improvement

  • Influenced software development approaches

Disadvantages:

  • Created unsustainable expectations

  • Approaching physical limits

  • Focused on transistor count over other metrics

  • Led to shorter hardware lifespans

  • Environmental consequences of rapid replacement


Emerging Areas of Computing

Quantum Computing

Characteristics:

  • Uses quantum bits (qubits) instead of binary bits

  • Leverages superposition and entanglement

  • Highly specialized for certain problem types

  • Requires extreme cooling and isolation

  • Still in early development stages

Advantages:

  • Exponential processing capability for specific problems

  • Could break current encryption methods

  • Potential for simulating quantum systems

  • Solving previously intractable problems

  • New approach to computational thinking

Disadvantages:

  • Extremely sensitive to environmental interference

  • Difficult to scale currently

  • Limited practical applications currently

  • Requires new programming paradigms

  • Expensive and specialized hardware


Neuromorphic Computing

Characteristics:

  • Computer architecture modeled on brain structure

  • Uses artificial neural networks in hardware

  • Energy efficient compared to traditional computing

  • Parallel processing architecture

  • Specialized for pattern recognition tasks

Advantages:

  • Energy efficiency for AI applications

  • Better at handling ambiguous data

  • Learns and adapts from experience

  • Potentially more robust to damage

  • Natural fit for certain AI applications

Disadvantages:

  • Limited general-purpose capabilities

  • Specialized programming requirements

  • Early in development cycle

  • Different error patterns than conventional computing

  • Difficult to debug and verify functionality


DNA Computing

Characteristics:

  • Uses DNA molecules for computation

  • Massively parallel processing capabilities

  • Stores information in nucleotide sequences

  • Uses biochemical reactions for processing

  • Merges biology and computing

Advantages:

  • Enormous potential data density

  • Inherently parallel computation

  • Low energy requirements

  • Potential for self-replication

  • Integration with biological systems

Disadvantages:

  • Extremely slow compared to electronic computing

  • Difficult to interface with traditional systems

  • Still largely theoretical or experimental

  • Complex setup and material requirements

  • Limited practical applications currently



IB DP Digital Society - Section 3.3 Computers Practice Exam Questions


Define/State Questions

  1. Define the term "computer" as used in digital society.

  2. State three essential characteristics of a mainframe computer.

  3. Define the term "central processing unit" and state its primary function.

  4. State four different types of computers discussed in the digital society curriculum.

  5. Define "Moore's Law" and state its significance in the evolution of computing.

  6. State three components that are classified as hardware in a computer system.

  7. Define what is meant by a "user interface" in computing.

  8. State two emerging areas in computing technology.


Identify Questions

  1. Identify three characteristics of low-level programming languages.

  2. Identify four hardware components of a modern personal computer.

  3. Identify two primary differences between markup languages and programming languages.

  4. Identify three advantages of wearable computing devices in modern society.

  5. Identify four examples of input devices used in computer systems.

  6. Identify three characteristics of malicious software.

  7. Identify the key differences between the fifth generation of computing and previous generations.


Outline Questions

  1. Outline three ways in which quantum computing differs from traditional computing.

  2. Outline the key differences between operating system software and application software.

  3. Outline two potential disadvantages of increasing reliance on tablet computers in educational settings.

  4. Outline the relationship between sensors and the development of smartphones.

  5. Outline how Moore's Law has influenced the evolution of personal computers over time.


Describe Questions

  1. Describe three characteristics of high-level programming languages with examples.

  2. Describe two ways that graphical user interfaces have evolved since their introduction.

  3. Describe the function of memory (RAM) in a computer system.

  4. Describe how the transition from the first to the second generation of computing changed computer technology.

  5. Describe two applications of neuromorphic computing in modern digital society.


Explain Questions

  1. Explain how storage technologies in computers have evolved from hard disk drives to solid-state drives.

  2. Explain two ways that markup languages contribute to the structure of information on the internet.

  3. Explain how smartphones combine multiple types of sensors to enhance user experience.

  4. Explain the significance of the motherboard in a computer system.

  5. Explain how low-level programming languages provide advantages for certain computing applications.


Compare Questions

  1. Compare mainframe computers and personal computers in terms of their processing capabilities and typical use cases.

  2. Compare high-level and low-level programming languages, considering their characteristics and applications.

  3. Compare the advantages and disadvantages of solid-state drives and traditional hard disk drives.

  4. Compare tablet computers and laptop computers as tools for productivity in professional environments.

  5. Compare the role of haptic interfaces and graphical user interfaces in modern computing devices.


Suggest Questions

  1. Suggest two ways that quantum computing might impact digital security in the future.

  2. Suggest three potential developments in wearable computing that might emerge in the next decade.

  3. Suggest how Moore's Law reaching its physical limits might affect the future development of computing technologies.

  4. Suggest two ways that improvements in computer interfaces could make technology more accessible to different user groups.

  5. Suggest how the increasing ubiquity of sensors in everyday devices might raise new ethical concerns for society.


Discuss Questions

  1. Discuss the challenges and opportunities presented by the emergence of DNA computing.

  2. Discuss how the evolution of user interfaces has changed the relationship between humans and computers.

  3. Discuss the potential impacts of neuromorphic computing on artificial intelligence development.

  4. Discuss the role of smartphones in transforming computing from a fixed to a mobile experience.

  5. Discuss how the five generations of computing reflect broader technological and societal changes.



IB DP student learning about COMPUTER to ace the IB Exam for Digital Society
IB DP student learning about COMPUTER to ace the IB Exam for Digital Society

Comments


  • Instagram
  • Youtube
  • X

2024 IBDP DIGITAL SOCIETY | LUKE WATSON TEACH

bottom of page