Anglais Terminale

Rejoignez la communauté !
Co-construisez les ressources dont vous avez besoin et partagez votre expertise pédagogique.
1. Identities and Exchanges
Ch. 1
The Canadian Tale
Ch. 2
Go Greek!
2. Private and Public Spheres
Ch. 3
Is It a Man’s World?
Ch. 4
The Roaring Twenties
3. Art and Power
Ch. 5
A Camera of Her Own
Ch. 6
A Never-Ending (Hi)story?
Ch. A
Conscious Art
4. Citizenship and Virtual Worlds
Ch. 7
To Tweet or Not to Tweet?
Ch. B
Digital Passports at Risk...
Ch. C
May I Borrow This?
5. Fiction and Realities
Ch. 8
Chivalry Isn’t Dead!
Ch. 9
It’s GoT to Be Shakespeare!
6. Scientific Innovations and Responsibility
Ch. 11
Green Waves
Ch. D
To Infinity and Beyond!
Ch. num
Tech for the Future?
7. Diversity and Inclusion
Ch. 12
Multicultural New Zealand
Ch. 13
Black Lives Matter
8. Territory and Memory
Ch. 14
Lighting Up Africa
Ch. 15
American Vibes
Fiches Méthode
Précis
Précis culturel
Précis de communication
Précis phonologique
Précis grammatical
Verbes irréguliers
CECR et programme
Rabats & annexes
Révisions
Unit 10
Bac

Exam file

Préparation aux évaluations communes
14 professeurs ont participé à cette page
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Évaluations communes

1H30
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Expression orale et synthèse de l'axe

L'entraînement à l'épreuve d'expression orale ainsi que la synthèse de l'axe 6 sont disponibles
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Compréhension de l'oral
Navajo Code Talkers Honored

1
Avant l'écoute, lisez le titre ci-dessus et regardez le nuage de mots.
a. Sur quoi peut porter cet enregistrement ? Faites trois hypothèses.

b. Trouvez cinq autres mots que vous pourriez entendre dans l'enregistrement.

2
Après l'écoute
En rendant compte, en français, du , vous montrerez que vous avez compris les éléments suivants :
  • Le thème principal du document ;
  • À qui s'adresse le document ;
  • Le déroulement des faits, la situation, les événements, les informations ;
  • L'identité des personnes ou des personnages et, éventuellement, les liens entre elles / entre eux ;
  • Les éventuels différents points de vue ;
  • Les éventuels éléments implicites du document ;
  • La fonction et la portée du document (relater, informer, convaincre, critiquer, dénoncer, etc.).
Afficher la correction
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.
Placeholder pour Navajo code talker veterans watching the opening ceremony for the 93rd New York City Veterans Day ParadeNavajo code talker veterans watching the opening ceremony for the 93rd New York City Veterans Day Parade
Le zoom est accessible dans la version Premium.
Navajo code talker veterans watching the opening ceremony for the 93rd New York City Veterans Day Parade, 2012.
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.
nuage de mots
Le zoom est accessible dans la version Premium.
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Video

Code Talkers Honored, KOAT, 2018. (Timing: 00:00 to 01:35)
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.
Compréhension de l'écrit
In November 1941, not long before the attack on Pearl Harbor, a handful of letters began materializing in student mailboxes at America's top women's colleges. The messages were cryptic and brief, inviting their mystified recipients to private interviews in which the students might be asked only a couple of similarly cryptic questions: Did they like crossword puzzles, and were they engaged to be married? The correct answer to the first question was yes; the desired answer to the second was no.

For more than a year, the U.S. Navy had been quietly recruiting male intelligence officers – specifically, code breakers, or “cryptanalysts” – from elite colleges and universities, and now it was embarking on the same experiment with women. Educated women were wanted for the war effort, and with all possible haste. [...]

In the late spring of 1942, the first wave of women recruited by the Navy finished their secret courses and turned in their final problem sets. Those who had stuck with the course and answered enough problems correctly – less than half of those recruited – arrived in fresh cotton dresses, prepared to start their duties, working in the Navy's hot and cramped downtown Washington, D.C., headquarters. [...]

Disparate as their backgrounds were, the women who answered the Navy's and Army's code-breaking summonses had a handful of qualities in common. They were smart and resourceful, and they had strived to acquire as much schooling as circumstances would permit, at a time when women received little encouragement or reward for doing so. They were adept at math or science or foreign languages, often all three. They were dutiful and patriotic. They were adventurous and willing. And they did not expect any public credit for the clandestine intelligence work they were entering into.

This last fact was perhaps the most important: their work was to be kept entirely secret. Just because they were female, they would not be spared the full consequences for treason in wartime. [...]

That millions of women served the war effort by rolling up their sleeves and donning trousers and jumpsuits to work in factories – the celebrated Rosie the Riveter, who helped build bombers and tanks and aircraft carriers – is well-known. Far less well-known is that more than 10,000 women traveled to Washington, D.C., to lend their minds and their hard-won educations to the war effort – and were behind some of the most significant individual code-breaking triumphs of the war. The women came from a generation when women did not expect – or receive – credit for achievement in public life. [...] Their efforts were almost completely hidden for more than 70 years [...].

As it turns out, during the most violent global conflict that humanity has ever known – a war that cost more money, damaged more property, and took more lives than any war before or since – these women formed the backbone of one of the most successful intelligence efforts in history, an effort that began before the Pearl Harbor attack and lasted until the end of World War II. [...]

That more than half of these “cryptographers” were women was nowhere mentioned.
Liza Mundy
“The Secret History of the Female Code Breakers Who Helped Defeat the Nazis”, Politico Magazine, 2017.

The Secret History of the Female Code Breakers Who Helped Defeat the Nazis

Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.
Questions
a) What is the nature of this document? What is its objective?

b) Explain what is presented (Who? What? Where? When?).

c) Pick out ten necessary conditions or qualities to be recruited as a female cryptanalyst.

d) In which other field did women contribute to the war effort?

e) What is implied in the passage from “The women... in public life”? Explain it in your own words.
Afficher la correction
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.
Expression écrite
Choisissez un sujet et répondez-y en anglais en 120 mots minimum.
Sujet A - Texte
Two of these women, who used to work together as cryptanalysts during the war, meet again 40 years later. Imagine their conversation.

Sujet B - Texte - Vidéo
Without these forgotten heroes and heroines, the Allies would have lost WWII. Discuss this statement.

Sujet C - Vidéo
After visiting an exhibition honoring Navajo Code Talkers, you write a column about your experience. Present the exhibition and explain how it made you feel.
Afficher la correction
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Tips

  • Soulignez les mots clés et écrivez les idées importantes ainsi que le vocabulaire utile sur un brouillon.
  • Structurez vos réponses et donnez votre avis.

Une erreur sur la page ? Une idée à proposer ?

Nos manuels sont collaboratifs, n'hésitez pas à nous en faire part.

Oups, une coquille

j'ai une idée !

Nous préparons votre pageNous vous offrons 5 essais
collaborateur

collaborateurYolène
collaborateurÉmilie
collaborateurJean-Paul
collaborateurFatima
collaborateurSarah
Utilisation des cookies
Lors de votre navigation sur ce site, des cookies nécessaires au bon fonctionnement et exemptés de consentement sont déposés.