Anglais Terminale - Cahier d'activités

Rejoignez la communauté !
Co-construisez les ressources dont vous avez besoin et partagez votre expertise pédagogique.
1. Identities and Exchanges
Ch. 1
The Canadian Tale
Ch. 2
Go Greek!
2. Private and Public Spheres
Ch. 3
Is It a Man’s World?
Ch. 4
The Roaring Twenties
3. Art and Power
Ch. 5
A Camera of Her Own
Ch. 6
A Never-Ending (Hi)story?
Ch. A
Conscious Art
4. Citizenship and Virtual Worlds
Ch. 7
To Tweet or Not to Tweet?
Ch. C
May I Borrow This?
5. Fiction and Realities
Ch. 8
Chivalry Isn’t Dead!
Ch. 9
It’s GoT to Be Shakespeare!
6. Scientific Innovations and Responsibility
Ch. 10
Breaking the Code
Ch. 11
Green Waves
Ch. D
To Infinity and Beyond!
7. Diversity and Inclusion
Ch. 12
Multicultural New Zealand
Ch. 13
Black Lives Matter
8. Territory and Memory
Ch. 14
Lighting Up Africa
Ch. 15
American Vibes
Méthode
Méthode : Les épreuves de Terminale
Unit B
Activity 1

Digitalization and Its Impact

11 professeurs ont participé à cette page
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Group 1

B2
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.
Text 1
Social media is, after all, just a small piece of the data puzzle. “We really have two forms of digital selves,” explains Jen King, director of privacy at the Center for Internet and Society at Stanford University. “One is basically all the data that companies collect on us — that's what you find in the hands of data brokers. The other is the one you construct, the one we curate and spend a lot of time trying to control. The two things overlap, but one is controlled by you and the other is not.”

[...] Even something as innocuous as a phone number can be used to reveal where you live, who you're related to, and whether or not you've ever been arrested. This information can also be used to breeze past security questions used to secure online accounts.

[...] Given the scale of the problem and the difficulty of staying completely offline, digital privacy is more important than ever before.
Zoe Schiffer,
“How to erase your personal information from the internet (it's not impossible!)”, Vox.com, 2019.
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Exercise 1

a. Pick out the equivalents of the following words from the text.
1. identities (n.) ➜

2. someone who sells data (n.) ➜

3. organize (v.) ➜

4. pass casually (v.) ➜



b. Find the equivalents of these French words in the text.
1. données (n.) ➜

2. vie privée (n.) ➜

3. se chevaucher (v.) ➜

4. inoffensif (adj.) ➜
Afficher la correction
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Exercise 2

a. Who is Jen King? Why is she reliable?


b. True or false? Justify by quoting a line from the text.

1. Our digital data isn't considered as a business.



2. The information available with a phone number can be used to hack online accounts.



3. Social media is the real problem for digital privacy.

Afficher la correction
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Exercise 3

Explain in your own words what is meant by “two forms of digital selves”.
Afficher la correction
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Group 2

B1
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.
Text 2
It used to be that when we thought of the future, we dreamed of the new and wonderful things people could be doing in it. Now, when we think of the future, we anticipate the development of new technologies [...].

A seminal year in this cultural shift was 1984. In fiction, it was the year of George Orwell's totalitarian dystopia, in which surveillance, absence of privacy, and what we now term “alternative facts” enabled the erasure of individuality. 1984 was also the year when William Gibson released Neuromancer, the book that popularized the term “cyberspace.” Gibson's novel tells the story of a washed‑up computer hacker hired by a mysterious employer to stage “the ultimate hack.” Neuromancer isn't exactly a utopian counter‑vision to 1984, but at least it expands the playing‑field.

[...] The themes explored in that year remain at the core of our culture's concern with the impact of digital innovation on human identity. Neuromancer has inspired an entire genre of science fiction as well as inspired the Hollywood blockbuster film series The Matrix.
Tim Leberecht
“Our Exponential Selves: Identity in the Digital Romantic Age”, Medium.com, 2017.
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Exercise 1

Pick out the equivalents of the following words in the text.

1. influential (adj.) ➜

2. move, change (n.) ➜

3. at the centre (n.) ➜

4. deletion, removal (n.) ➜

5. worry (n.) ➜

6. organise (v.) ➜
Afficher la correction
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Exercise 2

Fill in the blanks for each book or film.

1984NeuromancerThe Matrix
Afficher la correction
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Exercise 3

Tick the elements you would associate with the phrase “alternative facts”. Explain what you understand from it in your own words.

honesty
delusion
sincerity
reality
untruths
falsehoods

Afficher la correction
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Group 3

B2
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.
Text 3
The world is more connected than ever before. Increasingly significant aspects of our lives are being played out online. As our homes, our cars and even our fitness and health devices connect over the internet, they are transmitting thousands of bits of information about us.

But as we increase our connectivity, we're exposing ourselves to new risks. [...]

Cyber researchers have been working for years to help develop the right protocols to protect our homes, our physical safety and even our governments. [...]

Originally built as a way to secure cryptocurrency transactions, blockchain is a digital platform that verifies and records exchanges. It creates an indisputable history of these transactions that cannot be modified by a single user, eliminating opportunities for fraud. It is this feature that has some heralding blockchain as a potential solution for some types of cyber vulnerability. But does blockchain have the practical applications we need to keep our digital information secure?
Etta Di Leo,
“Is Blockchain the Future of Cyber Security?”, Uwaterloo.ca, 2019.
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Exercise 1

Find the equivalent of these words in the text.
1. announcing (v.) ➜

2. preserve (n., v.) ➜

3. characteristic (n.) ➜

4. small quantity (n.) ➜

5. keep a written account (v.) ➜
Afficher la correction
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Exercise 2

Use elements from the text to explain what “blockchain” is.

HowWhatOriginAimAction
Afficher la correction
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Group 4

B1
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Exercise 1

Pick out the equivalents of the following words from the .

1. publicitaires (n.) ➜

2. comportements (n.) ➜

3. cibler (v.) ➜

4. tarifs (n.) ➜

5. stocker (v.) ➜

6. localisation (n.) ➜
Afficher la correction
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Exercise 2

Explain in your own words what each operator does with your data.

Afficher la correction
Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Group 1, 2, 3 & 4

Ressource affichée de l'autre côté.
Faites défiler pour voir la suite.

Mediation
Let's recap!

Recap your document and what it explains about the limits and uses of sharing your personal data online. Imagine solutions to the issues raised.

Useful vocabulary
Internet users have been targeted by... Their data are likely to be... The notion of absence of privacy had already been... but cyber researchers have now been trying to... by + V-ing.

Enregistreur audio

Une erreur sur la page ? Une idée à proposer ?

Nos manuels sont collaboratifs, n'hésitez pas à nous en faire part.

Oups, une coquille

j'ai une idée !

Nous préparons votre pageNous vous offrons 5 essais
collaborateur

collaborateurYolène
collaborateurÉmilie
collaborateurJean-Paul
collaborateurFatima
collaborateurSarah
Utilisation des cookies
Lors de votre navigation sur ce site, des cookies nécessaires au bon fonctionnement et exemptés de consentement sont déposés.