Series 6 - Ethics, Law & Environment - Exam practice
Ethics, Law & Environment exam questions
Ten multiple choice questions covering all six lessons, followed by five written questions. Work through the MCQ first, then write full answers to the written questions before revealing the mark scheme.
Lesson 1
Privacy and Personal Data
Lesson 2
Legislation
Lesson 3
Environmental Impact
Lesson 4
The Digital Divide
Lesson 5
Cultural and Social Impact
Lesson 6
Open Source and Licensing
Section 1: Multiple choice
Select one answer per question. Instant feedback and an explanation appear when you choose.
Lesson 1
Question 1 of 10
A user's IP address is collected by a website without them knowing. Under GDPR, IP addresses are classified as:
Under GDPR, personal data is any information that can identify a living person directly or indirectly. An IP address can be used to identify a device and often a person, so it is classified as personal data. Organisations must have a lawful basis to collect it and must inform users.
Lesson 1
Question 2 of 10
Which of the following best describes a passive digital footprint?
A passive digital footprint is created without the user actively providing data - for example, websites recording your IP address, advertisers tracking your browsing history, or apps logging your location in the background. An active digital footprint is data you deliberately share, such as social media posts or form submissions.
Lesson 2
Question 3 of 10
A hacker accesses a company's database without permission but does not modify any data. Under UK law, which Act have they most likely broken?
The Computer Misuse Act 1990 makes it illegal to access any computer system without authorisation, even if no data is altered. Section 1 covers unauthorised access to computer material. The Data Protection Act governs how personal data is handled by organisations - it is not primarily a criminal law for hacking. The CDPA 1988 covers copyright infringement.
Lesson 2
Question 4 of 10
A developer copies code from an open source project and includes it in a commercial product without checking the licence terms. Which law are they most likely breaching?
Software is protected as a creative work under the Copyright Designs and Patents Act 1988. Even open source software is covered by copyright - the licence specifies what you are allowed to do. Copying and distributing code without complying with licence terms (e.g. GPL requires derivatives to also be open source) can be a copyright infringement.
Lesson 3
Question 5 of 10
Which of the following is the most significant environmental concern associated with large data centres?
Data centres consume enormous amounts of electricity - both to run the servers and to cool them (servers generate significant heat). This electricity often comes from fossil fuels, contributing to carbon emissions. Some data centres in countries like Ireland have faced criticism for their high proportion of national electricity usage. Cooling is sometimes the larger energy cost.
Lesson 3
Question 6 of 10
E-waste is a growing problem because:
E-waste is hazardous because electronic devices contain toxic substances including lead, mercury, cadmium and brominated flame retardants. When dumped in landfill, these chemicals leach into the soil and groundwater. Much e-waste is illegally shipped to developing countries where it is processed unsafely, causing serious health problems for local communities.
Lesson 4
Question 7 of 10
The digital divide refers to:
The digital divide describes the inequality between those who have access to modern digital technology and the internet, and those who do not. This divide can be based on income, geography (rural vs urban), age, disability, or country of origin. It matters because digital access is increasingly essential for education, employment and accessing public services.
Lesson 5
Question 8 of 10
An AI recruitment tool is found to give lower scores to CVs that include the word "women's" (e.g. "women's chess club"). This is an example of:
This describes algorithmic bias - a real case involving Amazon's AI recruitment tool, which was trained on historical hiring data that over-represented male applicants. The algorithm learned to penalise CVs containing terms associated with women. Algorithmic bias occurs when a system produces unfair outcomes due to biased training data or flawed design. Amazon discontinued the tool in 2018.
Lesson 5
Question 9 of 10
A filter bubble is most accurately described as:
A filter bubble occurs when recommendation and personalisation algorithms (used by social media, search engines and news sites) show users content aligned with their past behaviour and preferences. This can reinforce existing beliefs, limit exposure to different viewpoints, and contribute to political polarisation. The term was coined by internet activist Eli Pariser.
Lesson 6
Question 10 of 10
Which of the following best describes open source software?
Open source software makes its source code publicly available. Users are typically free to view, modify and distribute the code, but must comply with the specific open source licence (e.g. GPL, MIT). It is not the same as freeware - open source is about access to source code and redistribution rights, not just price. Examples include Linux, Firefox and LibreOffice.
Section 2: Written questions
Write your answer in full before revealing the mark scheme. These are worth marks in the exam, so practise structuring your answer carefully.
Lesson 1
Explain the difference between an active and a passive digital footprint. Give one example of each.
[4 marks]
An active digital footprint is data deliberately shared by the user - 1 mark
Example: posting on social media, submitting an online form, sending an email - 1 mark (any valid example)
A passive digital footprint is data collected without the user's active input - 1 mark
Example: browsing history, location data, IP address logged by websites - 1 mark (any valid example)
Award 1 mark per correct definition and 1 mark per correct example. Both types must be addressed for full marks. Accept equivalent correct answers.
Lesson 2
State two offences created by the Computer Misuse Act 1990 and give an example of each.
[4 marks]
Offence 1: Unauthorised access to computer material (Section 1) - 1 mark. Example: guessing someone's password to access their email account - 1 mark
Offence 2: Unauthorised access with intent to commit a further offence (Section 2) - 1 mark. Example: hacking into a bank's system to transfer money - 1 mark
Also accept Section 3: Unauthorised modification of computer material (e.g. installing malware, deleting files). Award 1 mark per offence identified, 1 mark per valid example. Any two of the three sections are acceptable.
Lesson 3
Describe two ways in which the widespread use of computers and digital technology has a negative impact on the environment.
[4 marks]
E-waste: discarded electronic devices contain toxic materials (lead, mercury) that pollute soil and water when sent to landfill - 1 mark description + 1 mark developed explanation
Energy consumption: data centres and devices consume large amounts of electricity, much of which is generated from fossil fuels, contributing to greenhouse gas emissions and climate change - 1 mark description + 1 mark developed explanation
Other valid answers: manufacturing computers requires extraction of rare earth metals (environmental damage from mining); frequent device replacement increases resource consumption; cooling systems in data centres use water. Award 1 mark per impact identified, 1 mark per development. Max 4.
Lessons 4 & 5
Explain two negative effects that automation may have on society. For each effect, suggest one way in which the impact could be reduced.
[6 marks]
Effect 1: Job displacement - automation replaces repetitive or manual jobs, leading to unemployment for workers in those roles - 1 mark. Mitigation: retraining programmes / investment in digital skills education so workers can take on new roles - 1 mark
Effect 2: Widening inequality - automation benefits companies that can afford the technology, potentially increasing the wealth gap between business owners and low-skilled workers - 1 mark. Mitigation: government policy such as taxation on automation to fund social support, or universal basic income schemes - 1 mark
Any additional valid effect with mitigation gains marks up to 6 - e.g. deskilling (workers lose expertise) / mitigation: maintaining human roles in critical processes
Award 1 mark per clearly described effect, 1 mark per developed mitigation strategy. Two effects with mitigations needed for full marks.
Lesson 6
Discuss the advantages and disadvantages of open source software compared to proprietary software. In your answer, consider both individual users and organisations.
[6 marks]
Advantage: Open source software is usually free to use and distribute, reducing costs for individuals and organisations - 1 mark
Advantage: Source code can be inspected, allowing security researchers to find vulnerabilities, and developers to customise it for their needs - 1 mark
Advantage: Large community of developers often means rapid bug fixes and feature additions - 1 mark
Disadvantage: Open source software may lack dedicated customer support, which can be a problem for organisations that need guaranteed help - 1 mark
Disadvantage: Making source code public means malicious actors can also read it and look for vulnerabilities to exploit - 1 mark
Disadvantage: Proprietary software often has a more polished user interface and dedicated development teams funded by licence revenue, making it more user-friendly for non-technical individuals - 1 mark
This is a 'discuss' question - credit both sides. A conclusion or balanced judgement earns the final mark if only 5 content points are made. Award up to 6 marks total. Accept equivalent valid points.