Free Essay

Baces

In:

Submitted By Demelyedoh
Words 1146
Pages 5
BACCALAURÉAT GÉNÉRAL

SESSION 2014

FRANÇAIS

ÉPREUVE ANTICIPÉE

SÉRIE ES/S

EPREUVE DU MERCREDI 18 JUIN 2014

Durée de l’épreuve : 4 heures

Coefficient : 2

L’usage des calculatrices et des dictionnaires est interdit.

Le sujet comporte 6 pages, numérotées de 1/6 à 6/6.

Le candidat s’assurera qu’il est en possession du sujet correspondant à sa série.

14FRSEME-LRM1

Page 1 sur 6

Objet d’étude :

Écriture poétique et quête de sens, du Moyen Âge à nos jours.

Le sujet comprend :

Texte A : Victor Hugo (1802-1885), « Crépuscule », Les Contemplations, II, XXVI (1856)

Texte B : Louis Aragon (1897-1982), « Vers à danser », Le Fou d’Elsa (1963)

Texte C : Claude Roy (1915-1997), « L’inconnue », À la lisière du temps (1986)

14FRSEME-LRM1

Page 2 sur 6

Texte A : Victor Hugo, « Crépuscule », Les Contemplations, II (1856)

CRÉPUSCULE L'étang mystérieux, suaire1 aux blanches moires2, Frissonne ; au fond du bois la clairière apparaît ; Les arbres sont profonds et les branches sont noires ; Avez-vous vu Vénus3 à travers la forêt ? 5 Avez-vous vu Vénus au sommet des collines ? Vous qui passez dans l'ombre, êtes-vous des amants ? Les sentiers bruns sont pleins de blanches mousselines4; L'herbe s'éveille et parle aux sépulcres5 dormants. Que dit-il, le brin d'herbe ? et que répond la tombe ? Aimez, vous qui vivez ! on a froid sous les ifs6. Lèvre, cherche la bouche ! aimez-vous ! la nuit tombe ; Soyez heureux pendant que nous sommes pensifs. Dieu veut qu'on ait aimé. Vivez ! faites envie, Ô couples qui passez sous le vert coudrier7. Tout ce que dans la tombe, en sortant de la vie, On emporta d'amour, on l'emploie à prier. Les mortes d'aujourd'hui furent jadis les belles. Le ver luisant dans l'ombre erre avec son flambeau. Le vent fait tressaillir, au milieu des javelles8, Le brin d'herbe, et Dieu fait tressaillir le tombeau. La forme d'un toit noir dessine une chaumière; On entend dans les prés le pas lourd du faucheur ; L'étoile aux cieux, ainsi qu'une fleur de lumière, Ouvre et fait rayonner sa splendide fraîcheur. 25 Aimez-vous ! c'est le mois où les fraises sont mûres. L'ange du soir rêveur, qui flotte dans les vents, Mêle, en les emportant sur ses ailes obscures, Les prières des morts aux baisers des vivants. Chelles, 18…
1 2

10

15

20

Suaire : linceul, c’est-à-dire drap blanc qui enveloppe les défunts. Moires : les reflets changeants, mats ou brillants, de certains tissus. 3 Vénus : peut désigner la planète qui se lève (appelée aussi l’étoile du soir ou l’étoile du berger), mais aussi la déesse de l’amour. 4 Mousselines : étoffes de coton blanches portées par les promeneuses. 5 Sépulcres : tombeaux. 6 If : conifère souvent planté dans les cimetières. 7 Coudrier : variété de noisetier. 8 Javelle : brassée de céréales, destinée à être liée pour former une gerbe.

14FRSEME-LRM1

Page 3 sur 6

Texte B : Louis Aragon, « Vers à danser », Le Fou d’Elsa (1963)

VERS À DANSER

5

Que ce soit dimanche ou lundi Soir ou matin minuit midi Dans l’enfer ou le paradis Les amours aux amours ressemblent C’était hier que je t’ai dit Nous dormirons ensemble C’était hier et c’est demain Je n’ai plus que toi de chemin J’ai mis mon cœur entre tes mains Avec le tien comme il va l’amble1 Tout ce qu’il a de temps humain Nous dormirons ensemble Mon amour ce qui fut sera Le ciel est sur nous comme un drap J’ai refermé sur toi mes bras Et tant je t’aime que j’en tremble Aussi longtemps que tu voudras Nous dormirons ensemble

10

15

1

Amble : allure dans laquelle le cheval lève ensemble les deux jambes du même côté, alternativement avec celles du côté opposé.

14FRSEME-LRM1

Page 4 sur 6

Texte C : Claude Roy, « L’inconnue », À la lisière du temps (1986)

L'inconnue Le premier froid luisant dans le soleil plain-chant1 le vif vent vert qui garde une bienveillance certaine et le bleu du ciel aigu comme un cri bleu d'hirondelle (elles sont pourtant bien loin 2 quelque part aux Afriques) Il y a encore les arbres en chœur qui chantent en vert majeur mais déjà les doigts de cuivre de l'automne les rouillent ici et là et il y a un arbuste (nous ne savons pas son nom) dont les feuilles roussies sont d'un capucine3 insolent mais ne veulent pas être feuilles mortes et s'accrochent Je suis simplement content d'être là avec toi de marcher près de toi dans l'herbe entre les arbres Plus je me sens rétrécir de l'écorce et du temps plus la vie est vaste plus le monde est grand Mais ça ne me fâche pas ni ne me fait peur Je ne saurai jamais l'allemand pour lire Rilke4 dans le texte Je n'irai probablement ni à Kyoto5 ni à Bali6 Il se fait un peu tard pour maîtriser le piano et je respecte sans pouvoir y entrer le savoir en mathématiques de mon ami Jacques Roubaud7 Tout ça n'a pas beaucoup d'importance Même si j'avais encore des ans et des années jamais non plus je ne te déchiffrerais entière jamais je ne connaîtrais tous les chemins de ta rêverie Les gens qu'on aime sont pareils à l'horizon qui se dérobe quand on avance et qui recule quand on approche Mais le bonheur d'être avec toi c'est de te connaître par cœur et pourtant de si peu te savoir que chaque matin je m'émerveille en découvrant à mon côté la mieux connue des inconnues le Haut Bout samedi 22 octobre 1983

5

10

15

20

25

1 2

Plain-chant : terme de musique qui désigne un chant dans lequel toutes les voix se font entendre à l'unisson. Les espaces blancs, aux vers 4, 9, 14, 19, 25, 27, sont voulus par le poète. 3 Capucine : rouge orangé. 4 Rilke : poète de langue allemande (1875-1926). 5 Kyoto : ville du Japon. 6 Bali : l’une des îles de l’Indonésie. 7 Jacques Roubaud : poète et mathématicien contemporain de Claude Roy.

14FRSEME-LRM1

Page 5 sur 6

ÉCRITURE

I. Vous répondrez d’abord à la question suivante (4 points) :

Comment s’exprime le sentiment amoureux dans les trois textes du corpus ?

II. Vous traiterez ensuite, au choix, l’un des sujets suivants (16 points) :

1. Commentaire : Vous ferez le commentaire du texte de Victor Hugo, « Crépuscule » (Texte A).

2. Dissertation : D’où provient, selon vous, l’émotion que l’on ressent à la lecture d’un texte poétique ? Vous répondrez à cette question en vous fondant sur les textes du corpus ainsi que sur les textes et œuvres que vous avez étudiés et lus.

3. Invention : Un article paru dans une revue littéraire reproche aux poètes de privilégier des thèmes sérieux et graves. Vous répondez à cet article par une lettre destinée au courrier des lecteurs de cette revue. Votre réponse comportera des arguments qui s’appuieront sur les textes du corpus, sur ceux que vous avez étudiés en classe et sur vos lectures personnelles.

14FRSEME-LRM1

Page 6 sur 6

Similar Documents

Premium Essay

Why Investors Should Invest in Emerging Markets

...Hogeschool Rotterdam | Why investors should invest in emerging markets | Counter argumentative essay | Quincy Barrow 11-7-2016 | Introduction Investors have been attracted to emerging markets since the early 2000s due to their huge growth potential during their economic transition from being a developing country into becoming a developed country. Between the year 2000 and 2011 the rapid growth in nations like Brazil, Russia, India and China - also known as the BRIC nations - has created many investment opportunities for foreign investors. Later countries like Chile, Egypt, Colombia, Qatar, United Arab Emirates, South Africa and Thailand have also been classified as emerging markets based on the MSCI benchmark. This essay touches on the reasons why investors should invest in emerging markets, which risks investors could have and how these risks could be mitigated. Emerging markets have been the drivers of the global economy According to Forbes (N.D.) over 70% of the global economic growth in the recent years has from emerging markets and their growing economies, 40% of which was estimated to have come from China and India. China’s purchasing power is expected to go beyond that of the United States by the end of 2016, despite the growth slowing down in recent years. Also, nations like China and India have had a significant contribution to the growth in the world’s GDP in the last decade, including in the 2008 credit crisis. With the up rise of countries like...

Words: 796 - Pages: 4

Free Essay

Economy

...of around 140 million (July 2011 EST.). Although women in Bangladesh make a direct and equal contribution to that of men in economical contributions, their productive worth is not acknowledged by this male dominated society. Lack of education remains as one of the root causes of the lack of recognition for women. As an intervention, increasing of women’s participation in regular schooling and continuation of study can have great potentials for development of women. The Female Stipend Program (FSP) was established in 1982 to raise girls participation in secondary education and eradicating early marriages and childbearing. This project was initiated and implemented with the help of The Bangladesh Association for Community Education (BACE), a national non-governmental organization (NGO) and later scaled up with technical and financial support of international organizations. The objective of FSP have shifted in line with changes in social/political environment, in development policies and in general understanding. The main priorities were higher secondary enrollment and retention, indirectly linked to fertility control, delayed marriage and population reduction. The Female Stipend Program (FSP) was primarily introduced in six areas only. The outcome of the project was positive as girl’s secondary enrollments increased from an average of 7.9% to 14% in some of the project areas whereas the dropout rates fell from 14.7% to 3.5%. This success of the project was the basis...

Words: 1387 - Pages: 6

Free Essay

Vpn vs Ids

...Compare and Contrast Three Intrusion Detection Systems (IDS) Devon Hopkins Webster University Introduction In the today’s society security is of paramount importance, whether it’s your business, home, vehicle, or computer. Companies are responsible for securing their employees, work area and the technology they use to operate their business. On a daily basis companies are under attack making them vulnerable to more and more worms, viruses, denial of service (DoS) attacks and hacking, shutting them down for various periods of times. With the advance technology more and more companies are storing information digitally. Having unsecure networks are leading to enormous amount of private information being public. The networks should protect data and maintain confidentiality, integrity and availability of the network. Companies should implement intrusion detection systems (IDS) because hackers are smarter and their intrusions are getting harder to trace. Intrusion Detection System An intrusion detection system or IDS is a system that attempts to identify intrusions, which can be defined to be unauthorized uses, misuses, or abuses of the computer systems by either authorized users or external perpetrators [1]. The in the past the major ways that intrusion detection systems were described were host based IDS (HIDS) and network based IDS (NIDS). An addition to the IDS family is perimeter intrusion detection systems (PIDS). A perimeter intrusion detection system will be installed...

Words: 1372 - Pages: 6

Free Essay

Neurodegenerative Disorders: Alzheimer’s Disease

...Neurodegenerative Disorders: Alzheimer’s Disease 1. Amyloid Precursor Protein (APP) Alzheimer’s disease (AD) remains a major cause of senile dementia, which is characterised by an impairment of neuronal and synaptic function in addition to the accumulation of β-amyloid plaque and formation of neurofibrillary tangles within distinct portions of the brain (De Strooper and Annaert, 2000). Progression of this distinct pathology of neurodegeneration does not typically vary from patient to patient, beginning in cerebral cortex before targeting the hippocampus, neocortex as well as the sub-cortical nuclei (Braak and Braak, 1995). The role of amyloid precursor protein (APP) in the pathogenesis of Alzheimer’s disease is pivotal. The cleavage of APP by the proteases β and γ- secretase releases β-amyloid (Aβ) peptides which results in aggregation of the peptides due to misfolding to form fibrils of Aβ which comprise the key components of amyloid plaque deposits in the brains of AD patients (Glenner and Wong, 1984). Amyloid precursor protein (APP) is a trans-membrane glycoprotein which normally functions in synapse formation as well as axonal elongation. The protein possesses a small cytoplasmic domain but is composed primarily of a large extracellular domain. Processing of APP in the extracellular domain by α or β- secretase results in the complete removal of the protein’s ectodomain which gives rise to an accumulation of sizeable and soluble derivatives of APP referred to as...

Words: 2251 - Pages: 10

Free Essay

Benefits of Using Ipv6 in Distributed Virtual Private Networks (Vpns)

...Benefits of using IPv6 in Distributed Virtual Private Networks (VPNs) Introduction The many advantages of improving and corporation's network, particularly its Virtual personal Networks (VPNs) from IPv4 to IPv6 create the expenses related to the move recoverable from increased network steadiness, auto-configuration, security, mobility, increase and quality-of-service and multicast capability (Cisco 2007). First, in phrases of quantitative, address varies for an IPv6-based network is 128-bits, providing the company lots higher security, likewise (Fink, 1999). Secondly, the safety concerns with regards to utilizing DHCP to assign information science addresses victimization IPv4 these days will be mitigated with the homeless reconfiguration capability of IPv6 (Lehtovirta, J 2006). With several of the systems throughout the company administered remotely exploitation IPsec-based VPNs, the opportunity to maneuver to more secure VPNs attributable to IPsec-mandated end-to-end security exploitation IPv6 also adds in greater levels of security moreover. The increasing use of wireless connections by members among the IT employees to observe and maintain IT systems also can currently be potential exploitation Mobile IP with Direct Routing (Cisco 2007). The redoubled support for protocols specifically for multicast routing are also supported in IPv6, that may build marketing’s’ several webinars and on-line initiatives additional expeditiously delivered, moreover. Most vital concerning...

Words: 3876 - Pages: 16

Premium Essay

Marketing Mix

...Marketing Mix “The four P approach has led to a manipulative attitude to people” (Gummesson, 2002:285). “What marketing deserves is new approaches, new paradigms, which are more market oriented” (Gronroos, 2002:140). “We propose that the mix has now reached its vanishing point, and we argue that marketing requires a new paradigm” (O’Malley & Patterson, 2002:50). What is common among the above three quotations is the fact that they are all against the Marketing mix. They also share the common belief that it’s time for a radical change, one where the 4Ps are rejected for a new paradigm. But the importance of the 4Ps is being undermined. Despite its limitations, they still form the base which is being used by modern organizations. This paper attempts to show the importance of the marketing mix for modern marketers and that it cannot be relegated from modern marketing strategy. The paper is divided into six parts. Beginning with the introduction it then moves on to the development of the marketing mix theory. The third part contains the literature review of the mix. The fourth asserts that marketing mix in conjunction with RM and CRM can result in a successful marketing strategy and the fifth uses Lexus as an example to prove this assertion. It ends with the conclusion. What Is Marketing Mix? The Oxford Dictionary of Business and Management’s definition of the Marketing Mix is of “the factors controlled by a company that can influence consumers’ buying of its products” (Anon...

Words: 4449 - Pages: 18

Free Essay

International Journal of Network Security & Its Applications (Ijnsa), Vol.4, No.2, March 2012

...AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM Mohammad Sazzadul Hoque1, Md. Abdul Mukit2 and Md. Abu Naser Bikas3 1 Student, Department of Computer Science and Engineering, Shahjalal University of Science and Technology, Sylhet, Bangladesh sazzad@ymail.com 2 Student, Department of Computer Science and Engineering, Shahjalal University of Science and Technology, Sylhet, Bangladesh mukit.sust027@gmail.com 3 Lecturer, Department of Computer Science and Engineering, Shahjalal University of Science and Technology, Sylhet, Bangladesh bikasbd@yahoo.com ABSTRACT Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions and misuses. So Intrusion Detection Systems have become a needful component in terms of computer and network security. There are various approaches being utilized in intrusion detections, but unfortunately any of the systems so far is not completely flawless. So, the quest of betterment continues. In this progression, here we present an Intrusion Detection System (IDS), by applying genetic algorithm (GA) to efficiently detect various types of network intrusions. Parameters and evolution processes for GA are discussed in details and implemented. This approach uses evolution theory to information evolution in order to filter the...

Words: 4796 - Pages: 20

Premium Essay

Mr. Aborgeh Christian

...An Event-Based Digital Forensic Investigation Framework∗ Brian D. Carrier carrier@cerias.purdue.edu Eugene H. Spafford spaf@cerias.purdue.edu Center for Education and Research in Information Assurance and Security - CERIAS Purdue University West Lafayette, IN 47907 USA Abstract In this paper, we present a framework for digital forensics that includes an investigation process model based on physical crime scene procedures. In this model, each digital device is considered a digital crime scene, which is included in the physical crime scene where it is located. The investigation includes the preservation of the system, the search for digital evidence, and the reconstruction of digital events. The focus of the investigation is on the reconstruction of events using evidence so that hypotheses can be developed and tested. This paper also includes definitions and descriptions of the basic and core concepts that the framework uses. 1 Introduction Since the first Digital Forensic Research Workshop (DFRWS) in 2001 [Pal01], the need for a standard framework has been understood, yet there has been little progress on one that is generally accepted. A framework for digital forensics needs to be flexible enough so that it can support future technologies and different types of incidents. Therefore, it needs to be simple and abstract. On the other hand, if it is too simple and abstract then it is difficult to create tool requirements and test procedures for each phase. For this paper...

Words: 6869 - Pages: 28

Premium Essay

Efdsf

...Number 115– October 2010 Globalization, Economic Freedom and Human Rights Axel Dreher Martin Gassebner Lars-H. R. Siemers ISSN: 1439-2305 Globalization, Economic Freedom and Human Rights Axel Dreher a Martin Gassebner b Lars-H. R. Siemers c October 2010 Abstract Using the KOF Index of Globalization and two indices of economic freedom, we empirically analyze whether globalization and economic liberalization affect governments’ respect for human rights using a panel of 106 countries over the 1981-2004 period. According to our results, physical integrity rights significantly and robustly increase with globalization and economic freedom, while empowerment rights are not robustly affected. Due to the lack of consensus about the appropriate level of empowerment rights as compared to the outright rejection of any violation of physical integrity rights, the global community is presumably less effective in promoting empowerment rights. Keywords: Human Rights, Globalization, Economic Freedom, Liberalization JEL-Codes: D78, F55, K10, P48 a Georg-August University Goettingen, Platz der Goettinger Sieben 3, 37073 Goettingen, Germany, KOF Swiss Economic Institute, Switzerland, CESifo, and IZA, Germany. Email: mail@axel-dreher.de ETH Zurich, KOF Swiss Economic Institute, Weinbergstrasse 35, CH-8092 Zürich, Switzerland, CESifo, Germany. E-mail: gassebner@kof.ethz.ch c b RWI Essen – Institute for Economic Research, Hohenzollernstraße 1-3, 45128 Essen, Germany...

Words: 22232 - Pages: 89

Free Essay

Hunger Games Srpski

...IGRE GLADI: KNJIGA PRVA Naziv originala: Suzanne Collins - THE HUNGER GAMES Copyright © by Suzanne Collins, 2008 Copyright © za srpsko izdanje Alnari d.o.o. 2008 ISBN 978-86-7710-399-6 Za Džejmsa Proimosa PRVI DEO TRIBUTI 01 Kada sam se probudila, druga strana kreveta bila je hladna. Ispružila sam prste u potrazi za Priminom toplinom, ali dotakla sam samo grubu površinu dušeka. Mora da je sanjala nešto ružno i otišla kod majke. Naravno da jeste. Danas je dan žetve. Podigla sam se na lakat. U spavaćoj sobi ima dovoljno svetlosti da ih osmotrim. Moja mlađa sestra Prim sklupčala se u loptu, a majka se obmotala oko nje. Spavale su obraz uz obraz. Majka u snu deluje mlađe. I dalje deluje umorno, ali ne i izmoždeno. Primino lice je sveže poput rose, ljupko poput cveta* po kojem je dobila ime. Pored njenih kolena, najružniji mačor na svetu, sedi i čuva je. Nos mu je zgnječen, pola jednog uha nedostaje, a oči su mu boje trule bundeve. Prim ga je nazvala Ljutić, insistirajući na tome da njegovo mrljavo žuto krzno podseća na žarke boje tog cveta. Mene mrzi. U najmanju ruku mi ne veruje. Mada je od tada prošlo mnogo godina, mislim da se još seća kako sam pokušala da ga udavim u kofi kada ga je Prim donela kući. Bio je mršavo mače, stomaka natečenog od crva i krzna prepunog buva. Samo mi je to falilo. Još jedna usta koja treba nahraniti. Ali, Prim me preklinjala, čak je i plakala. Morala sam da joj dopustim da ga zadrži. Sve je ispalo dobro. Majka ga je očistila od gamadi,...

Words: 84792 - Pages: 340

Premium Essay

Promises Not Kept

...THE END of POVERTY Economic Possibilities for Our Time JEFFREY D. SACHS THE PENGUIN PRESS N E W YORK 2005 THE PENGUIN PRESS Published by the Penguin Group Penguin Group (USA) Inc.. 375 Hudson Street. New York, New York 10014, U.S.A. Penguin Group (Canada), 10 Alcorn Avenue, Toronto, Ontario, Canada M4V 3B2 (a division of Pearson Penguin Canada Inc.) Penguin Books Ltd, 80 Strand, London WC2R ORL, England Penguin Ireland, 25 St. Stephen's Green, Dublin 2, Ireland (a division of Penguin Books Ltd) Penguin Books Australia Ltd, 250 Camberwell Road, Camberwell, Victoria 3124, Australia (a division of Pearson Australia Group Pty Ltd) - Penguin Books India Pvt Ltd, 11 Community Centre, Panchsheel Park, New Delhi-110 017, India ' Penguin Group (NZ), Cnr Airborne and Rosedale Roads, Albany, Auckland 1310, NewZealand (a division of Pearson New Zealand Ltd) - Penguin Books (South Africa) (Pty) Ltd, 24 Sturdee Avenue, Rosebank, Johannesburg 2196, South Africa Penguin Books Ltd, Registered Offices: 80 Strand, London WC2R ORL, England First published in 2005 by The Penguin Press, a member of Penguin Group (USA) Inc. Copyright ©Jeffrey D. Sachs, 2005 All rights reserved Page 397 constitutes an extension of this copyright page, LIBRARY OF CONGRESS CATALOGING IN PUBLICATION DATA Sachs, Jeffrey. The e n d of poverty / Jeffrey Sachs. p. cm. Includes bibliographical references and index. ISBN 1-59420-045-9 1. Poverty—Developing countries. 2. Developing countries—Economic policy...

Words: 154314 - Pages: 618