Anglais Terminale

Rejoignez la communauté !
Co-construisez les ressources dont vous avez besoin et partagez votre expertise pédagogique.
1. Identities and Exchanges
Ch. 1
The Canadian Tale
Ch. 2
Go Greek!
2. Private and Public Spheres
Ch. 3
Is It a Man’s World?
Ch. 4
The Roaring Twenties
3. Art and Power
Ch. 5
A Camera of Her Own
Ch. 6
A Never-Ending (Hi)story?
Ch. A
Conscious Art
4. Citizenship and Virtual Worlds
Ch. 7
To Tweet or Not to Tweet?
Ch. C
May I Borrow This?
5. Fiction and Realities
Ch. 8
Chivalry Isn’t Dead!
Ch. 9
It’s GoT to Be Shakespeare!
6. Scientific Innovations and Responsibility
Ch. 10
Breaking the Code
Ch. 11
Green Waves
Ch. D
To Infinity and Beyond!
Ch. num
Tech for the Future?
7. Diversity and Inclusion
Ch. 12
Multicultural New Zealand
Ch. 13
Black Lives Matter
8. Territory and Memory
Ch. 14
Lighting Up Africa
Ch. 15
American Vibes
Fiches Méthode
Précis
Précis culturel
Précis de communication
Précis phonologique
Précis grammatical
Verbes irréguliers
CECR et programme
Rabats & annexes
Révisions
Unit B
Activity 1 - Group
Differentiation

Digitalization and its Impact

17 professeurs ont participé à cette page
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Group 1

Each group is in charge of a document. Study it and
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Text document

Social media is, after all, just a small piece of the data puzzle. “We really have two forms of digital selves,” explains Jen King, director of privacy at the Center for Internet and Society at Stanford University. “One is basically all the data that companies collect on us — that's what you find in the hands of data brokers. The other is the one you construct, the one we curate and spend a lot of time trying to control. The two things overlap, but one is controlled by you and the other is not.”

[...] Even something as innocuous as a phone number can be used to reveal where you live, who you're related to, and whether or not you've ever been arrested. This information can also be used to breeze past security questions used to secure online accounts.

[...] Given the scale of the problem and the difficulty of staying completely offline, digital privacy is more important than ever before.
Zoe Schiffer
“How to erase your personal information from the internet (it's not impossible!)”, Vox.com, 2019.

“How to erase your personal information from the internet (it's not impossible!)”

Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Group 2

Each group is in charge of a document. Study it and
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Text document

It used to be that when we thought of the future, we dreamed of the new and wonderful things people could be doing in it. Now, when we think of the future, we anticipate the development of new technologies [...].

A seminal year in this cultural shift was 1984. In fiction, it was the year of George Orwell's totalitarian dystopia, in which surveillance, absence of privacy, and what we now term “alternative facts” enabled the erasure of individuality. 1984 was also the year when William Gibson released Neuromancer, the book that popularized the term “cyberspace.” Gibson's novel tells the story of a washed‑up computer hacker hired by a mysterious employer to stage “the ultimate hack.” Neuromancer isn't exactly a utopian counter‑vision to 1984, but at least it expands the playing‑field.

[...] The themes explored in that year remain at the core of our culture's concern with the impact of digital innovation on human identity. Neuromancer has inspired an entire genre of science fiction as well as inspired the Hollywood blockbuster film series The Matrix.
Tim Leberecht
“Our Exponential Selves: Identity in the Digital Romantic Age”, Medium.com, 2017.

“Our Exponential Selves: Identity in the Digital Romantic Age”

Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Group 3

Each group is in charge of a document. Study it and
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Text document

The world is more connected than ever before. Increasingly significant aspects of our lives are being played out online. As our homes, our cars and even our fitness and health devices connect over the internet, they are transmitting thousands of bits of information about us.

But as we increase our connectivity, we're exposing ourselves to new risks. [...]

Cyber researchers have been working for years to help develop the right protocols to protect our homes, our physical safety and even our governments. [...]

Originally built as a way to secure cryptocurrency transactions, blockchain is a digital platform that verifies and records exchanges. It creates an indisputable history of these transactions that cannot be modified by a single user, eliminating opportunities for fraud. It is this feature that has some heralding blockchain as a potential solution for some types of cyber vulnerability. But does blockchain have the practical applications we need to keep our digital information secure?
Etta Di Leo
“Is Blockchain the Future of Cyber Security?”, Uwaterloo.ca, 2019.

“Is Blockchain the Future of Cyber Security?”

Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Group 4

Each group is in charge of a document. Study it and
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Picture

Infography on different ways your online data is being used right now
Le zoom est accessible dans la version Premium.
Adapted from “11 Ways Your Online Data Is Being Used Right Now”, mentalfloss.com, 2016.
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.
Questions
You are in charge of one document.
1
a. Read your document. Which of these concepts is referred to?
blockchain
digital privacy
data storage
digital innovation in literature
Pick out elements in your document to illustrate your choice.

b. Present your document using what you have found.
2
a. What could the consequences of data aggregation be?

b. What solutions are suggested?

Useful vocabulary
The document conveys the idea that...
Data aggregation could...
I think that we should...

Let's talk this out!
Group work
Mediation

Share your findings with your classmates.
3
a. What are the common points and differences between your documents?

b. Which one is the most convincing? The most striking? The most reliable? Explain.
4
a. What is the most effective way to raise awareness about digital dangers?

b. From now on, how will you change the way you share your personal information on the Internet? Why?

Useful vocabulary
We have to be careful when we...
I don't think I'll change the way I use the Internet because...
The first thing I'll do is...
Afficher la correction
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Grammar in progress

La forme passive

a. Relevez toutes les formes passives présentes dans les textes.

b. Pour chacune, expliquez la formation de la phrase. (Qui fait l'action ? Qui la subit ?)

c. Transformez ces phrases à la voix active.

Afficher la correction
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Let's learn!

Guess what

Tell the class all about your purchasing and posting habits on the Internet. Your classmates must guess what you may find on your sidebars then.
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Over to you!

Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Share Your Opinion

Let's use what you have learnt in  !

After reading about all this, you google yourself. Explain your reaction to what you find in a post. What do you intend to do now to define and protect your digital identity?
Afficher la correction

Une erreur sur la page ? Une idée à proposer ?

Nos manuels sont collaboratifs, n'hésitez pas à nous en faire part.

Oups, une coquille

j'ai une idée !

Nous préparons votre pageNous vous offrons 5 essais
collaborateur

collaborateurYolène
collaborateurÉmilie
collaborateurJean-Paul
collaborateurFatima
collaborateurSarah
Utilisation des cookies
Lors de votre navigation sur ce site, des cookies nécessaires au bon fonctionnement et exemptés de consentement sont déposés.