ajout dossier evaluation

This commit is contained in:
2021-12-09 22:22:14 +01:00
parent bf7c95b49f
commit 23eb14de35
11 changed files with 547 additions and 0 deletions

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.5 MiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.4 MiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.3 MiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.5 MiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.5 MiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.1 MiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.1 MiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 890 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.2 MiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.0 MiB

View File

@@ -0,0 +1,547 @@
{
"cells": [
{
"cell_type": "markdown",
"id": "3d0c34cb",
"metadata": {},
"source": [
"# SNT - Chapitre Internet"
]
},
{
"cell_type": "markdown",
"id": "c677b0e2",
"metadata": {},
"source": [
"## Évaluation finale"
]
},
{
"cell_type": "markdown",
"id": "6cbc904c",
"metadata": {},
"source": [
"-------\n"
]
},
{
"cell_type": "markdown",
"id": "504622dc",
"metadata": {},
"source": [
"> Après avoir vu ce qu'était Internet, comment fonctionnaient les protocoles, et avoir analyser les différentes problématiques liées au monde du numérique, vous allez, dans le cadre de votre évaluation, devoir répondre à quelques questions sur plusieurs activités."
]
},
{
"cell_type": "markdown",
"id": "b61e2eef",
"metadata": {},
"source": [
"**_Consigne_** : Par groupe de 2 élèves, en utilisant vos **_connaissances personnelles_**, les **_documents fournis_** ainsi que votre **_sens de la recherche internet_**, vous devrez répondre aux questions sur le document notebook, comme nous l'avons vu en utilisant basthon."
]
},
{
"cell_type": "markdown",
"id": "a80e57e4",
"metadata": {},
"source": [
"**Attention** Vous ne devez choisir que trois (3) activités parmi les cinq (5) proposées !"
]
},
{
"cell_type": "markdown",
"id": "78421c29",
"metadata": {},
"source": [
"---------"
]
},
{
"cell_type": "markdown",
"id": "fbe335c1",
"metadata": {},
"source": [
"## Activité 1"
]
},
{
"cell_type": "markdown",
"id": "94f401e5",
"metadata": {},
"source": [
"![Activité_1.1](Activité_1.1.png)"
]
},
{
"cell_type": "markdown",
"id": "d2f907a0",
"metadata": {},
"source": [
"![Activité_1.2](Activité_1.2.png)"
]
},
{
"cell_type": "markdown",
"id": "b17be8ca",
"metadata": {},
"source": [
"### Questions "
]
},
{
"cell_type": "markdown",
"id": "9f2273e0",
"metadata": {},
"source": [
" 1. Quelle invention a permis de garantir l'acheminement des données dans un réseau ?"
]
},
{
"cell_type": "markdown",
"id": "3b437ad7",
"metadata": {},
"source": [
"Réponse"
]
},
{
"cell_type": "markdown",
"id": "5a3fb89f",
"metadata": {},
"source": [
"2. À quoi servent les protocoles ? Dans quelle mesure ont-ils contribué au développement d'Internet ?"
]
},
{
"cell_type": "markdown",
"id": "e1c3e316",
"metadata": {},
"source": [
"Réponse"
]
},
{
"cell_type": "markdown",
"id": "98d82363",
"metadata": {},
"source": [
"3. Quelle est la différence entre Internet et le Web ?"
]
},
{
"cell_type": "markdown",
"id": "0ece8027",
"metadata": {},
"source": [
"Réponse"
]
},
{
"cell_type": "markdown",
"id": "69909243",
"metadata": {},
"source": [
"-----------\n"
]
},
{
"cell_type": "markdown",
"id": "fd45c398",
"metadata": {},
"source": [
"## Activité 2"
]
},
{
"cell_type": "markdown",
"id": "91d8bc0d",
"metadata": {},
"source": [
"![Activité_2.1](Activité_2.1.png)"
]
},
{
"attachments": {},
"cell_type": "markdown",
"id": "e76dc775",
"metadata": {},
"source": [
"![Activité_2.2](Activité_2.2.png)"
]
},
{
"cell_type": "markdown",
"id": "3ef214fd",
"metadata": {},
"source": [
"### Questions"
]
},
{
"cell_type": "markdown",
"id": "5ed33f6c",
"metadata": {},
"source": [
"1. Comment peut on qualifier l'évolution du trafic sur Internet ?"
]
},
{
"cell_type": "markdown",
"id": "65906c75",
"metadata": {},
"source": [
"Réponse"
]
},
{
"cell_type": "markdown",
"id": "5cb9bcc5",
"metadata": {},
"source": [
"2. Comment explique t-on cette évolution du trafic ? Comment pensez vous que cela évoluera dans le futur proche ?"
]
},
{
"cell_type": "markdown",
"id": "8d24465b",
"metadata": {},
"source": [
"Réponse"
]
},
{
"cell_type": "markdown",
"id": "93395143",
"metadata": {},
"source": [
"3. Peut-on utiliser un pc de tous les jours comme serveurs ? Comme client ?"
]
},
{
"cell_type": "markdown",
"id": "0b2a7beb",
"metadata": {},
"source": [
"Réponse"
]
},
{
"cell_type": "markdown",
"id": "8391b6ed",
"metadata": {},
"source": [
"4. Décrire les différents types de connexions que vous avez chez vous."
]
},
{
"cell_type": "markdown",
"id": "ed7554de",
"metadata": {},
"source": [
"Réponse"
]
},
{
"cell_type": "markdown",
"id": "cbcc6307",
"metadata": {},
"source": [
"---------"
]
},
{
"cell_type": "markdown",
"id": "229f4a2a",
"metadata": {},
"source": [
"## Activité 3"
]
},
{
"cell_type": "markdown",
"id": "8586c432",
"metadata": {},
"source": [
"![Activité_3.1](Activité_3.png)"
]
},
{
"attachments": {},
"cell_type": "markdown",
"id": "15fa987b",
"metadata": {},
"source": [
"![Activité_3.2](Activité_3.2.png)"
]
},
{
"cell_type": "markdown",
"id": "b54bfb8b",
"metadata": {},
"source": [
"### Questions"
]
},
{
"cell_type": "markdown",
"id": "daebd823",
"metadata": {},
"source": [
"1. Quel est l'intérêt de la communication par paquet ?"
]
},
{
"cell_type": "markdown",
"id": "ce379e0d",
"metadata": {},
"source": [
"Réponse"
]
},
{
"cell_type": "markdown",
"id": "6f92aff0",
"metadata": {},
"source": [
"2. Comment et pourquoi la durée de vie d'un paquet de données évolue t-elle au fil du temps ?"
]
},
{
"cell_type": "markdown",
"id": "f847180d",
"metadata": {},
"source": [
"Réponse"
]
},
{
"cell_type": "markdown",
"id": "81d654a4",
"metadata": {},
"source": [
"3. Que dire du nombre d'adresses IP disponibles en comparaison au nombre de personnes sur la planète, soit un peu plus de 7 milliards ?"
]
},
{
"cell_type": "markdown",
"id": "09d7d21a",
"metadata": {},
"source": [
"Réponse"
]
},
{
"cell_type": "markdown",
"id": "eff462b6",
"metadata": {},
"source": [
"-------"
]
},
{
"cell_type": "markdown",
"id": "c752d365",
"metadata": {},
"source": [
"## Activité 4"
]
},
{
"cell_type": "markdown",
"id": "58f9a098",
"metadata": {},
"source": [
"![Activité_4.1](Activité_4.1.png)"
]
},
{
"cell_type": "markdown",
"id": "5199e5e2",
"metadata": {},
"source": [
"![Activité_4.2](Activité_4.2.png)"
]
},
{
"cell_type": "markdown",
"id": "1967f8ab",
"metadata": {},
"source": [
"### Questions"
]
},
{
"cell_type": "markdown",
"id": "8a9cbea6",
"metadata": {},
"source": [
"1. À quel domaine appartient l'adresse **_www.education.gouv.fr_** ? Comment connaître l'adresse IP correspondante ?"
]
},
{
"cell_type": "markdown",
"id": "d590c711",
"metadata": {},
"source": [
"Réponse"
]
},
{
"cell_type": "markdown",
"id": "8ac392c6",
"metadata": {},
"source": [
"2. À quelle étape du document 3 un-e pirate risque d'intercepter les données ?"
]
},
{
"cell_type": "markdown",
"id": "96260dfc",
"metadata": {},
"source": [
"Réponse"
]
},
{
"cell_type": "markdown",
"id": "9af1f59e",
"metadata": {},
"source": [
"3. Pourquoi parle t-on de notion de confiance en matière de DNS ?"
]
},
{
"cell_type": "markdown",
"id": "d7883528",
"metadata": {},
"source": [
"Réponse"
]
},
{
"cell_type": "markdown",
"id": "e9d18bac",
"metadata": {},
"source": [
"-----------"
]
},
{
"cell_type": "markdown",
"id": "43065e10",
"metadata": {},
"source": [
"## Activité 5"
]
},
{
"cell_type": "markdown",
"id": "42701bb9",
"metadata": {},
"source": [
"![Activité_5.1](Activité_5.1.png)"
]
},
{
"cell_type": "markdown",
"id": "927c3a1e",
"metadata": {},
"source": [
"![Activité_5.2](Activité_5.2.png)"
]
},
{
"cell_type": "markdown",
"id": "477c3214",
"metadata": {},
"source": [
"### Questions"
]
},
{
"cell_type": "markdown",
"id": "a6f76ecb",
"metadata": {},
"source": [
"1. Que peut-on dire des machines dans un réseau pair à pair ?"
]
},
{
"cell_type": "markdown",
"id": "464d70b4",
"metadata": {},
"source": [
"Réponse"
]
},
{
"cell_type": "markdown",
"id": "910ba58a",
"metadata": {},
"source": [
"2. En quoi consiste le protocole BitTorrent ?"
]
},
{
"cell_type": "markdown",
"id": "ec98be13",
"metadata": {},
"source": [
"Réponse"
]
},
{
"cell_type": "markdown",
"id": "7f0d2821",
"metadata": {},
"source": [
"3. En quoi le pair à pair peut-il est illégal ?"
]
},
{
"cell_type": "markdown",
"id": "4ee0e20d",
"metadata": {},
"source": [
"Réponse"
]
},
{
"cell_type": "markdown",
"id": "0f4c3125",
"metadata": {},
"source": [
"------"
]
},
{
"cell_type": "markdown",
"id": "1f694c82",
"metadata": {},
"source": [
"Source : Manuel SNT Delagrave, 2019."
]
}
],
"metadata": {
"kernelspec": {
"display_name": "Python 3 (ipykernel)",
"language": "python",
"name": "python3"
},
"language_info": {
"codemirror_mode": {
"name": "ipython",
"version": 3
},
"file_extension": ".py",
"mimetype": "text/x-python",
"name": "python",
"nbconvert_exporter": "python",
"pygments_lexer": "ipython3",
"version": "3.8.8"
}
},
"nbformat": 4,
"nbformat_minor": 5
}