Chargement de l'audio en cours


Digital Passports at Risk...
Page numérique

Unit B

4 • Citizenship and Virtual Worlds
WB p. 49

Digital Passports at Risk...
USA flag
UK flag

➜ To what extent are we in control of our digital identity?

Retrouvez un quiz d’anticipation et un quiz de révisions pour cette unité, à faire en classe en direct !

Retrouvez une banque d'audios et de vidéos authentiques en lien avec cette thématique.

Ce chapitre numérique est téléchargeable au format PDF ici !

Serious Game

Retrouvez un Genially pour anticiper la séquence en cliquant ici.

Photomontage about digital identity

Get ready!

a. What words come to mind when you think of digital identity?

b. Look at the vocabulary lists. Find a title for each category, then add the words you found.

a. Look at the picture. How does it illustrate digital identity?

b. Think of all the ways you identify yourself on the Internet.
Voir la correction

Watch the video. Sum it up, and explain what digital identity means.

Discuss these brainstorming questions with your classmates:
How concerned do you feel about privacy when you log on to a website? Have you ever googled your name on the Internet? Someone else’s name? What would you expect to find?

Read the idiom of the week. Rephrase it in your own words and give examples.
Voir la correction


  • offline / online (adj.)
  • theft / data breach /ˈdԑɪtə ˈbriːʧ/ (n.)
  • aggregate /ˈægrɪˌgԑɪt/ (v.)
  • compromise /ˈkɒmprəˌmaɪz/ (v.)
  • hack /ˈhæk/ (v.)

Let’s learn!

Find the word!

Choose a word from the vocabulary lists. Give a synonym or a definition of it and have your classmates guess it.
Voir la correction

Picture of an iceberg

Idiom of the week!

The tip of the iceberg!


Of course, everybody knows the story of the Titanic. This idiom is inspired by the iceberg, rather than the ship. The first use was actually recorded in 1969. The metaphor is used to refer to a problem which seems small and relatively harmless, but whose true, greater significance is hidden.

Digital Identity

box 1
  • black hat (exp.)
  • data analyst (exp.)
  • software engineer (exp.)
  • cryptographer (n.)
  • developer (n.)
  • hacker (n.)
  • programmer (n.)

box 2
  • addictive (adj.)
  • behavioural (adj.)
  • counterintuitive (adj.)
  • emphatic /ɪmˈfætɪk/ (adj.)
  • fast-changing (adj.)
  • digital native (exp.)
  • interact with (v.)

box 3
  • underhand / sneaky (adj.)
  • encryption /ɪnˈkrɪpʃən/ (n.)
  • hindrance / obstacle (n.)
  • threat /ˈθrɛt/ (n.)
  • steal (v.)

box 4
  • blackmail /ˈblækˌmɛɪl/ (n. or v.)
  • corroborate (v.)
  • display /dɪsˈplɛɪ/ (v.)
  • distort (v.)
  • engross /ɪnˈgrəʊs/ (v.)
  • interfere with (v.)
  • intrude in (v.)

box 5
  • exposure (n.)
  • connect / bond (v.)
  • engage with (v.)
  • express oneself (v.)
  • misuse /ˌmɪsˈjuːz/ (v.)
  • overuse (v.)
  • post /ˈpəʊst/ (v.)

box 6
  • nosey /ˈnəʊzɪ/ (adj.)
  • keep tabs on (exp.)
  • titbit /ˈtɪtbɪt/ (fam.) (n.)
  • snoop / spy on (v.)
  • stalk /ˈstɔːk/ (v.)
  • track (v.)
  • unmask (v.)

On your way to the task ❯❯ Step 1

After googling yourself, write your reaction in a post.

❯❯ Step 2

Create a pitch for a TV episode on digital identity.

❯❯ Your final project

Organize a school event for the All Digital Week.
Utilisation des cookies
Lors de votre navigation sur ce site, des cookies nécessaires au bon fonctionnement et exemptés de consentement sont déposés.