0% found this document useful (0 votes)
110 views17 pages

G3 Computing Textbook Chapter 13

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views17 pages

G3 Computing Textbook Chapter 13

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

CHAPTER

13 Impact of Computing

481
482
13.1 Impact of Computing on Different Industries

LEARNING OUTCOMES
5.1.1 !"#$%$&'()*$+%,-%./$%"()'0.%,-%0,()1.$2+%"3%./$%-,**,4"35%"361+.2"$+7
8% 9,((13"0'.",37%':"*".;%.,%0,33$0.%)$,)*$%'36%:1+"3$++$+%,#$2%*,35%6"+.'30$+
8% <610'.",37% $'+;% '00$++% .,% ,3*"3$% 0*'++$+% '36% *'25$% '(,13.+% ,-% "3-,2('.",3% #"'% ./$%
"3.$23$.
8% =2'3+),2.'.",37% 4"6$+)2$'6% '00$++% .,% 3'#"5'.",3'*% +$2#"0$+% #"'% !*,:'*% >,+".",3"35%
?;+.$(%@!>?A%'36%$($25$30$%,-%+$*-B62"#"35%#$/"0*$+
8% C$.'"*7%(,2$%2$*"':*$%.2'0D"35%,-%'#'"*':*$%+.,0D%'36%$($25$30$%,-%+$*-B0/$0D,1.%0,13.$2+

Over the past few decades, there have been sweeping changes to society and the daily lives of people all
over the world due to rapid advancements in computing technology. Significant milestones in this journey
include the introduction of electronic computers in the 1940s, the invention of the World Wide Web in 1989,
and the current widespread availability of smart devices and Artificial Intelligence (AI) systems.

Today, computing is an important part of not just the technology sector but almost every aspect of the
economy, including the communications, education, transportation and retail industries. In this section,
we will examine the impact of computers on these industries in greater detail.

13.1.1 Communications Industry

The most important ways computers have impacted the communications industry are summarised in
Table 13.1.

Area Description

Digitalisation Before computers, communication methods, such as using telephone wires and
radio waves, were usually analogue in nature. This meant that any interference
or noise would directly affect the clarity of the message (e.g., voice) being
transmitted.

With the wider adoption of computers, communications became digitised. Digital


transmission offers significant advantages over analogue transmission in noisy
environments as it includes mechanisms for error detection (see Chapter 10)
and correction. These features ensure the clarity of transmitted messages by
identifying and fixing errors that may occur during transmission.

483
Area Description

Real-time Before computers, real-time communication was generally limited to voice


multimedia through telephone wires and radio waves. Other types of media were distributed
communication physically (e.g., letters, newspapers, photographs), which limited the speed of
communication.

Digital transmission has allowed for more efficient compression algorithms


and communication protocols such that people and businesses are now able to
communicate in real-time over long distances using multiple types of media (e.g.,
text, images, audio and video).

This has allowed for more face-to-face meetings to be replaced by cheap and
effective video conferencing calls, especially during the worldwide COVID-19
pandemic.

Then Now

Mobile As computer components have become miniaturised, computing and


computing communication devices have also become smaller and more portable. This has
led to the rise of mobile computing devices like laptops and smartphones such
that many people and businesses are now contactable anywhere and anytime.

As of 2024, about 60% of views on the web are done using a mobile device
compared to about 40% from desktop devices.
Then Now

13:34
Monday, 23 July

Accessibility and The Internet has enabled diverse cultures to interact and share ideas with each
globalisation other, allowing for the seamless exchange of information across borders. This has
had profound implications for culture, business, and politics, leading to a more
interconnected world.

Computing advancements such as AI have also made it possible for anyone to


automatically transcribe and translate messages into different languages with
remarkable speed and accuracy.

484
Area Description

Social media and The Internet has enabled the rise of social media, which has transformed how
misinformation information is disseminated and consumed. Unlike traditional media such as
newspapers and television which have limited audience participation and high
entry barriers, social media allows anyone with Internet access to produce
content, fostering two-way communication between content producers and
consumers.

While social media has democratised content creation and fostered community
building, some people use it to reinforce their existing opinions or to spread
rumours and misinformation. The way that social media sites promote content,
based on how much they elicit responses and not by their accuracy, can also
amplify the reach of false information (see section 13.2.1).

The situation is worsened by advancements in AI that have made it easy to


produce realistic looking faked media content of situations or events that did not
actually occur, making it difficult for individuals and societies to discern truth
from falsehood (see Chapter 14).

Security and The digitalisation of communication has made it easier for messages (that may
privacy risks include personal data) to be accidentally or maliciously copied and disclosed to
unauthorised parties. Digital communication methods are also susceptible to
cyberattacks that may compromise security and privacy (see Chapter 11).

Furthermore, the widespread use of the Internet and advanced data analysis
has made it easier to track the online movements and preferences of users. This
allows websites and services to tailor content and advertisements to users, but
these capabilities may also be misused to compromise the privacy of individuals.

Table 13.1 Impact of technology on communications industry

13.1.2 Education Industry

The most important ways computers have impacted the education industry are summarised in Table 13.2.

Area Description

Communication In line with how computers have impacted communications in general (see
and section 13.1.1), computing has introduced new tools that teachers and students
collaboration can use to communicate and collaborate for learning. These new tools include
emails, forums, video conferences and collaborative documents (e.g., Google
Docs).

Using these tools, teachers and students can communicate with each other and
engage in collaborative learning without the need to be at the same location or be
online simultaneously.

485
Area Description

Access to Before the Internet, obtaining information typically involved visiting a library
information or consulting with experts. With the Internet and digitalisation of both new and
existing materials, students now have unparalleled access to vast amounts of
information and educational materials as long as they have a computer. The
widespread availability of Internet access has also extended these educational
opportunities to learners from disadvantaged backgrounds who might not had
have such access previously.

Then Now

Personalised In traditional classroom education with static learning materials, teachers need
learning to expend a significant amount of manual effort to provide instructions that are
customised to each student.

But with the integration of computers and digital learning materials, lessons can
be more readily adjusted and customised to suit the individual needs of students.
Using data analysis and technologies like AI, such customisations can even be
automated for thousands of students, enabling personalised learning without
excessive manual intervention.

In this way, students can more easily direct their own learning and progress at
their own pace instead of having to follow the pace set by a teacher.

Interactive and Before computers, classroom instruction primarily relied on learning materials
multimedia tools with static text and images. With the widespread use of portable computing
devices, teachers can now effortlessly employ interactive and multimedia tools
to enhance the learning experiences of students. Using resources such as videos,
interactive simulations and virtual environments, lessons have become more
engaging and relevant to students, both within and beyond the classroom.
Then Now

486
Area Description

Distance and In distance learning, teachers and students are geographically separated, and
online learning students are not required to be physically present in a school or classroom for
lessons. Before computers and the Internet, such lessons were usually conducted
via mail, resulting in significant delays for students in receiving learning materials,
submitting assignments, and receiving feedback.

Today, distance learning is predominantly carried out online using digital


communication and collaboration tools. Numerous schools and universities
now offer online courses, enabling students to attain educational qualifications
regardless of geographical constraints.

Then Now

Assessment and In the past, teachers manually graded assignments, investing significant effort to
feedback customise tasks and provide individual feedback to students.

Using computers, certain assignments can now be automatically graded,


providing students with immediate feedback to identify their strengths and
weaknesses. This enables students and teachers to promptly pinpoint areas
requiring improvement.

With data analysis and technologies such as AI, assignments can also be made
adaptive such that the difficulty of tasks is automatically adjusted to match each
student’s skill level. This approach ensures that students are not discouraged
by overly challenging questions and enhances the accuracy of assessing the
student’s learning progress.

Need for digital The widespread adoption of computers has revolutionised society and the job
literacy market, necessitating countries to revise their education systems accordingly. In
addition to the traditional curricula, schools must now also teach students the
digital literacy skills essential for everyday life and the contemporary workplace.

Consequently, some teachers discover that they themselves need training to


acquire new skills and assume the responsibility of developing the digital literacy
of students. This can be challenging due to the rapid pace of technological
advancements and the multitude of other priorities that teachers must also
address.

Table 13.2 Impact of technology on education industry

487
U
DID YO
O W ?
K N
In Singapore, a significant way that computers have had an impact on education is with the introduction
of the Singapore Student Learning Space (SLS). The SLS is an example of a Learning Management
System that facilitates online learning, manages assignments, and tracks student progress. It also
serves as a repository of high-quality multimedia learning resources and has features to support
personalised learning for students.

13.1.3 Transportation Industry

The most important ways computers have impacted the transportation industry are summarised in Table
13.3.

Area Description

Navigation and Before computers, navigation was primarily reliant on printed maps, which were
GPS inconvenient and static. Today, detailed digital maps and real-time information
on public transportation, traffic conditions and street-level photographs of
neighbourhoods worldwide are readily accessible through mobile computing
devices (e.g., smartphones). Some map services even provide 3D maps to display
individual buildings in greater detail or to make geospatial data more accessible
and useful to users.

While street-level photographs and 3D models are beneficial to travellers, some


people are uncomfortable about the easy online accessibility of pictures and
information about their homes, and the possibility that these might be used
without their explicit permission.

Then Now

488
Area Description

Some mobile devices also have access to the Global Positioning System (GPS)
that utilises satellite data to determine the user’s location. This allows a user to
easily obtain navigational directions to get from one location to another in real-
time. However, these navigation features typically require access to GPS satellites,
the Internet and electricity. In situations where all three elements might not be
available, printed maps may still be necessary.

Smart and Advancements in computing technologies such as AI have led to the development
autonomous of smart vehicles capable of operating with reduced human intervention. These
vehicles vehicles are typically equipped with advanced sensors, cameras, and computers
that continually collect and process data to navigate roads, detect pedestrians
and make real-time decisions. There are also different levels of automation
available, ranging from basic assistance (e.g., helping drivers stay in lane) to full
automation where no human intervention is needed for the vehicle to operate.

LIDAR (Light Detecting and


Ranging) bounce pulses of light
off surroundings to sense the
environment in 3D.

GPS (Global Positioning


System) satellite signals track Video cameras read traffic lights
the car’s precise location. and road signs as well as the
positions of pedestrians, vehicles
and other obstacles.

Ultrasonic sensors measure


the position of nearby objects
such as curbs and other
Central computer
vehicles during parking.
continuously collects
and processes data
from sensors to make
real-time decisions
and obey traffic laws. Radar sensors track the position of
nearby vehicles.

Smart vehicles offer convenience and may indeed be safer than human drivers,
who due to fatigue or other factors, can be susceptible to accidents. However,
if an accident does occur, there are ethical concerns over tasking software to
make complex moral choices such as deciding whether the safety of the vehicle’s
occupants should be prioritised over the safety of pedestrians and other drivers.
Additionally, it remains unclear whether the responsibility for an accident should
rest with the vehicle’s owner or the software developer. As automation becomes
more commonplace, some people who drive for a living may also lose their jobs.

In essence, substantial societal and legal changes may be necessary to address


these concerns and mitigate the adverse impact of smart and autonomous
vehicles on human society.

489
Area Description

Traffic In the past, traffic conditions were monitored mainly through manual methods
monitoring (e.g., radio reports from traffic helicopters). Now, with the widespread use of GPS
enabled mobile devices, many mapping services can gather location data from
these devices to track the number and speed of vehicles on the road, allowing
them to offer more accurate traffic condition estimates in real-time.

On the negative side, there are privacy concerns about how such location data
might be misused to track the movements of individuals or to reveal personal
details such as home and work addresses that users may wish to keep private.

Enhanced public Today, contactless payments have replaced physical tickets and fares are
transportation automatically calculated based on where passengers enter and exit the public
transport system. Real-time information on schedules and delays are also readily
available on public displays and mobile devices.

Mobile applications have further simplified the process of hailing a taxi by


enabling users to locate the nearest taxi, set up a pickup point, track the vehicle’s
arrival in real time, and seamlessly handle payment. This convenience has made
using applications for taxi services a highly preferred option for many travellers.

13.1.4 etail Industry

The most important ways computers have impacted the retail industry are summarised in Table 13.4.

Area Description

Inventory An important process in retail is inventory management, which involves tracking


Management the stock of products to ensure that the business is able meet customer demand
without overstocking. In the past, this was done manually by physically counting
the available stock and keeping records in ledger books. As a result, the process
was time-consuming and prone to error.

490
Area Description

Inventory Nowadays, inventory items are labelled


Management with barcodes that uniquely identify
(continued) each product and can be easily read
by specialised cameras called barcode
scanners. This enables stocktaking (i.e.,
the process of counting and recording
the amount of stock) to be performed
more quickly and reliably with the aid of
computers.

Some businesses attach small electronic devices called


Near-Field Communication (NFC) tags to inventory
items that also uniquely identify each product to
inventory items. These tags are even more efficient
than barcodes as they can be read wirelessly using a
reader device. With NFC tags, inventory management
can be streamlined further, allowing for real-time
tracking of stock levels and reducing the likelihood of
stocktaking errors.

Checkout Purchasing items in retail stores used to be a manual process which required
process payment by cash and the manual entry of prices into a cash register. However,
using barcodes and NFC tags, the total cost of purchased items can now be quickly
and accurately determined without the manual entry of prices.

With computers and mobile devices, many stores also accept cashless payments
where transactions are approved over a computer network by the customer’s
bank. The customer’s identity is verified by checking if the customer has a
physical card or by biometric authentication using a mobile device. This offers
greater convenience to customers but increases the risk of fraud.

In some stores, there are automated kiosks that allow customers to perform the
checkout themselves by scanning the barcodes or NFC tags of the items they
wish to purchase. These self-checkout counters reduce wait times and the need
for cashier staff, but they also inconvenience customers and increase the risk of
shoplifting.
Then Now

491
Area Description

E-commerce With the Internet and cashless payments, customers are no longer limited to
making purchases solely in physical stores but can also buy items online. As they
are not limited by physical space, e-commerce sites are often accessible outside
of regular business hours and offer a wider range of products than physical stores.
Many e-commerce sites also track the purchase histories of customers, allowing
them to make personalised recommendations for other products that customers
may be interested in.

While convenient, some customers may prefer physical stores so they can
physically inspect items before purchasing them or to save on shipping costs.
There are also security and privacy concerns regarding whether the information
collected by e-commerce sites (such as purchase history and payment details)
could be made public or misused due to cyberattacks. Many scammers also
pretend to run legitimate online businesses but become uncontactable after
payment is made. As such, it is important to always check the reputation of an
e-commerce site before proceeding with an online purchase.
Then Now

SORRY WE’RE
CLOSED 6pm
Mon-Fri 9am - )
Sat-Sun (close

QUICK
E C K 13.1
CH
1. State whether each of these statements is true or false:
a) Analog communication is more resilient to noise than digital communication.
b) Multiple types of media (e.g., text, images, video) can be transmitted via digital communication.
c) A large amount of manual effort is needed to personalise learning if static learning materials are used.
d) Collaborative learning over the Internet requires all participants to be online at the same time.
e) GPS location requires the visibility of GPS satellites.
f) It is not possible for autonomous vehicles to cause a traffic accident.
g) Self-checkout counters reduce wait times but inconvenience customers.
h) Physical stores typically have a wider range of products than e-commerce stores.

2. Give two examples of the impact of computers in each of the following industries:
a) Communications industry
b) Education industry
c) Transportation industry
d) Retail industry

492
13.2 Proliferation of False oods

LEARNING OUTCOMES
5.3.1 <&)*'"3%4/;%./$%)2,(,.",3%,-%+,0"'*%($6"'%),+.+%:'+$6%,3%$35'5$($3.%2'.$%/$*)+%.,%6$*"#$2%
2$*$#'3.%0,3.$3.%.,%1+$2+%:1.%0'3%'*+,%*$'6%.,%./$%)2,*"-$2'.",3%,-%-'*+$/,,6+E
5.3.2 <&)*'"3%/,4%./$%>2,.$0.",3%-2,(%F3*"3$%G'*+$/,,6+%'36%H'3")1*'.",3%I0.%@>FGHIA%$3':*$+%
./$%5,#$23($3.%.,%.'0D*$%./$%+)2$'6%,-%-'D$%3$4+%:;7
8% $+.':*"+/"35%-"3$+%'36J,2%)2"+,3%.$2(+%-,2%$35'5"35%"3%)2,/":".$6%'0."#"."$+K
8% ,).",3'**;%2$L1"2"35%,M$36$2+%.,%)1.%1)%'%0,22$0.",3%3,."0$%,2%.,%.'D$%6,43%./$%-'*+$/,,6K%
'36
8% "6$3."-;"35%+".$+%./'.%2$)$'.$6*;%+)2$'6%-'*+$/,,6+E

13.2.1 Algorit ms and Social edia

ERMS
As discussed in section 13.1.1, the Internet has enabled
the rise of social media where users can create and share
KEY T
content (i.e., posts) with other users. For many social Engagement rate
media sites, users do not always have full control over A measure of how much other users
which posts they see. Instead, social media sites typically actively interact with a social media post
use algorithms to determine which posts are promoted
and featured prominently in the feed where content from Feed (social media)
other users are displayed. A feature of social media sites where
posts from other users are displayed as a
One key factor considered by these algorithms is a post’s continuously updated stream of content
engagement rate that measures how much other users
actively interact with a post, such as by clicking on it Post (social media)
to view more details, commenting on it, sharing it with Any content (e.g., text, pictures, videos,
other users, “liking” it and so on. Assuming that users links) shared by a user on social media
are more likely to interact with posts that are relevant to
them, a post’s engagement rate thus measures how likely
the post is of interest to other users.

Social media sites promote posts based on engagement rates for three main reasons:

1 To increase the site’s


relevance to users 2 To incentivise the creation
of relevant posts 3 To increase advertising
revenue

Prioritising posts with high Prioritising posts with high The main source of revenue
engagement ensures that users engagement rewards creators for most social media sites
see posts that they are more who make interesting content is advertising. Engagement
likely to find interesting. This with more visibility and a larger is evidence that users are
helps the social media site audience. This incentivises paying attention to a post and
deliver more relevant content, creators to produce content social media sites can charge
increasing the site’s potential that users are interested in and advertisers higher rates for
value and usefulness to users. are likely to engage with. placing ads around content
with high engagement rates.

493
U
DID YO
KNOW?
While these reasons
make sense, the practice
of promoting posts with
high engagement rates
has sometimes led to the
Most social media sites do not solely rely on a single overall engagement unintended consequence of
rate to determine which posts to promote. Instead, they analyse each proliferating harmful content
user’s past interactions with various posts to construct a profile of (e.g., abuse, harassment)
each user’s preferences and interests. Based on this profile, social and falsehoods. This is
media sites can curate and prioritise content that that has the highest because high engagement
engagement rate for similar users, making promoted posts even more does not imply desirable or
personalised. accurate content.
These profiles are also useful for social media sites to increase For instance, some posts
advertising revenue by charging advertisers higher rates if they wish attract users interaction by
to target their ads to users with specific interests or online behaviours. provoking outrage or other
Advertisers are willing to pay these higher costs in exchange for strong negative emotions.
reaching a more engaged and interested audience, resulting in a better As a result, some unethical
return on their advertising investment. creators are incentivised
to post falsehoods or half-
Additionally, an unintended consequence of featuring content based truths that deliberately omit
on user preferences is that some users may find themselves in a crucial context to garner
“bubble”, where their social media feed only contains content that they attention. They may also
agree with. These users are thus at risk of underexposure to alternative post controversial opinions
viewpoints and become susceptible to communities that propagate that are intentionally divisive
misinformation. or insensitive to entice user
comments.

Another tactic employed by unethical creators to generate posts with high engagement involves
impersonating notable individuals or companies. They may also use AI to produce realistic yet fabricated
media depicting situations or events that never actually occurred, making it difficult for users to discern
truth from falsehoods (see Chapter 14).

To defend against the proliferation of falsehoods, users should practice good media literacy skills when
browsing social media. Before taking the content of a post at face value, it is important to assess the
source’s trustworthiness, seek supporting evidence from other sources and to read beyond the headline
for additional context.

If you believe that you have found a harmful post, many social media sites provide ways for users to flag
content that is inaccurate or misleading. This is one way that social media sites try to disincentivise creators
from manufacturing high engagement through harmful means.

13.2.2 Protection from nline False oods and anipulation Act P F A

To tackle the spread of fake news, in 2019 the Protection from Online Falsehoods and Manipulation Act
(POFMA) was passed by the Parliament of Singapore. The law specifically targets false statements of fact
that are communicated in Singapore through the Internet and are against the public interest. It is not
intended to cover opinions, criticisms, satire or parody.

If an offender is found to have engaged in prohibited activities under the Act, they may be subject to
imprisonment, a fine or both.

494
In most cases, the offender may be issued with a “Correction Direction”. This requires them to put up a
correction notice against the original post that provides a warning about the falsehood and a clarification
of the facts.

In more serious cases, the offender may be issued with a “Stop Communication Direction”. This requires
them to take down the original post with the falsehood.

The Act also lets the government blacklist sites that repeatedly spread falsehoods (i.e., by spreading 3 or
more different falsehoods which are the subject of active Directions within the preceding 6 months). These
identified sites are called “Declared Online Locations” and will not be allowed to profit from spreading
falsehoods in Singapore.

QUICK 3 . 2
K 1
CHEC
1. A social network has a feature that marks some user accounts, mainly journalists and celebrities, as “verified”.
The process to gain this “verified” status requires manual verification and assessment of noteworthiness.
a) Suggest why this feature exists and what it may be designed to prevent.
b) The social network decides to change its policy so any user account can obtain the “verified” status by
having a credit card associated with the account and by paying a monthly fee. Suggest some benefits and
risks to users with this change in policy.

2. An online news site is found to have published false information that contravenes POFMA.
a) Suppose this is the site’s first offence. State two possible consequences.
b) Now suppose that the site has committed such offences repeatedly. What additional consequence may
there be?

W
REVIE
E STI ON
Q U
1. Explain how the growth of mobile computing has impacted the accessibility of communication tools.

2. Describe two ways in which the introduction of the Internet has impacted the accessibility of education.

3. Autonomous vehicles present some ethical challenges. Describe a possible ethical challenge that society may
have to face when fully autonomous vehicles that operate without human intervention become commonplace.

4. Suggest one advantage and one disadvantage of self-checkout counters for retailers.

5. Social media sites typically promote posts with high engagement rates.
a) Suggest two statistics that a social media site might measure to determine the engagement rate of a post.
b) Suggest one ethical approach and one unethical approach to producing content that is likely to have a high
engagement rate.

495
ANSWER

Pg. 492-Quick Check 13.1


1. a) False
b) True
c) True
d) False
e) True
f) False
g) True
h) False

2. a) Any 2 out of (accept any possible answer):


• Transition from analogue to digital transmission.
• Enabling of real-time multimedia communication.
• Growth of mobile computing and smartphones.
• Increased accessibility of communication tools and globalisation.
• Growth of social media and misinformation.
• Increased security and privacy risks due to cyberattacks.

b) Any 2 out of (accept any possible answer):


• Increased accessibility of educational resources over the Internet.
• Enhancement of personalised learning with digital learning resources.
• Increased use of interactive and multimedia resources.
• Enhanced communication and collaboration tools.
• Growth of distance and online learning.
• Enabling of automated and adaptive assessment and feedback.
• Increased need for digital literacy.

c) Any 2 of the following (accept any possible answer):


• Enhanced navigation with the introduction of GPS.
• Growth of smart and autonomous vehicles.
• Enhanced traffic monitoring via data collected from mobile devices.
• Enhanced public transportation (e.g., real-time information on schedules,
cashless payments, streamlined apps for taxi booking).

d) Any 2 of the following (accept any possible answer):


• Enhanced inventory management with barcodes and NFC tags.
• Enhanced checkout process with cashless payment and self-checkout
counters.
• Growth of e-commerce sites.

Pg. 495-Quick Check 13.2


1. a) The feature may have been designed to decrease misinformation by preventing malicious users from
impersonating notable journalists and celebrities.
b) Benefits: Legitimate users no longer need to go through a potentially slow and inconsistent manual
verification process where they must justify their notability to obtain the “verified” status.
Risks: Having a credit card and paying a monthly fee only provides a weak form of verification and the risk of
fake accounts impersonating notable journalists and celebrities is likely to increase.

2. a) Any 2 out of the following:


• Fine
• Prison
• Putting up of correction notice
• Taking down of falsehood

b) Identification by government that the site has repeatedly spread falsehoods.

496
ANSWER
Pg. 495-Review Questions
1. Mobile computing has made communication devices smaller and more portable, allowing people and
businesses to be contactable anywhere and anytime, significantly increasing communication accessibility.

2. Any 2 of the following (accept any possible answer):


• Access to information: With the Internet and digitalisation of both new and existing materials over
time, students now have unparalleled access to vast amounts of information and educational materials
with just a computer. The widespread availability of Internet access has also opened these educational
opportunities to learners from disadvantaged backgrounds who might not have had such access
previously.
• Communication and collaboration: The Internet has introduced new tools where teachers and students
do not need to be at the same location or even be online simultaneously to communicate with each other
and learn collaboratively.
• Distance and online learning: With the Internet, distance learning is now conducted online using digital
communication and collaboration tools. Many schools and universities offer online courses so students can
earn educational qualifications regardless of geographical constraints.
• Need for digital literacy: The Internet has transformed society and the job market, necessitating countries
to update their education systems accordingly. In addition to the traditional curriculum, schools must now
also equip students with the digital literacy skills essential for daily life and the modern workplace.

3. Any 1 of the following (accept any possible answer):


• Decision-making in emergencies: If an accident involving an autonomous vehicle occurs, there are ethical
concerns with programming software to make complex moral decisions such as whether the safety of the
vehicle’s occupants should be prioritised over the safety of pedestrians and other drivers.
• Accountability: If an accident involving an autonomous vehicle occurs, it is unclear if responsibility and
liability for the accident should lie with the vehicle’s owner, the vehicle manufacturer, or the software
developer.
• Privacy: Autonomous vehicles work by collecting and processing large amounts of data from advanced
sensors and cameras. There are privacy concerns about how such location data might be misused to track
the movement of individuals or to reveal personal details.
• Impact on employment: As autonomous vehicles become commonplace, some people who drive for a
living may also lose their jobs. Society faces the ethical challenge of addressing this job displacement.

4. Any 1 advantage out of the following (accept any possible answer):


• Cost savings due to reduced need for cashier staff
• Possible increased customer satisfaction due to reduced wait times

Any 1 disadvantage out of the following (accept any possible answer):


• Possible decreased customer satisfaction due to the inconvenience of self-checkout
• Possible increased shoplifting rates

5. a) Any 2 of the following:


• Number of times the post has been clicked on or expanded.
• Number of comments or replies to the post.
• Number of times the post has been shared.
• Number of “likes” on the post.

b) Any ethical approach out of the following (accept any possible answer):
• Creating content that is informative, entertaining and/or inspiring to generate interest among users.
• Being inclusive, sensitive and/or respectful to avoid driving away users.

Any unethical approach out of the following (accept any possible answer):
• Spreading falsehoods or half-truths that purposely leave out important context to attract attention.
• Posting controversial opinions that are intentionally divisive or insensitive, so users are enticed to comment.
• Impersonating notable people or companies.

497

You might also like