{"id":7517,"date":"2026-01-05T14:19:00","date_gmt":"2026-01-05T13:19:00","guid":{"rendered":"https:\/\/sites.ac-corse.fr\/1d2b\/?p=7517"},"modified":"2026-03-18T09:08:20","modified_gmt":"2026-03-18T08:08:20","slug":"les-bonnes-pratiques-numeriques","status":"publish","type":"post","link":"https:\/\/sites.ac-corse.fr\/1d2b\/2026\/01\/05\/les-bonnes-pratiques-numeriques\/","title":{"rendered":"Les bonnes pratiques num\u00e9riques"},"content":{"rendered":"\n<p><em><strong>Cette action aupr\u00e8s des \u00e9l\u00e8ves peut contribuer \u00e0 la mise en oeuvre du programme Phare et de l&rsquo;axe 3 du projet Acad\u00e9mique.<\/strong><\/em><\/p>\n\n\n\n<p>Les usages num\u00e9riques s\u2019installent de plus en plus t\u00f4t dans la vie des \u00e9l\u00e8ves. Pour se construire une culture num\u00e9rique responsable, ils doivent apprendre \u00e0 adopter de bons r\u00e9flexes et \u00e0 d\u00e9velopper leur esprit critique.&nbsp;<\/p>\n\n\n\n<p>Voici une proposition de d\u00e9marche p\u00e9dagogique permettant de sensibiliser les \u00e9l\u00e8ves d\u00e8s le CE2 \u00e0 des concepts de cybers\u00e9curit\u00e9 tout en mobilisant l\u2019imaginaire et la cr\u00e9ativit\u00e9.<\/p>\n\n\n\n<p>La d\u00e9marche propos\u00e9e s\u2019organise autour de trois \u00e9tapes compl\u00e9mentaires&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Favoriser la compr\u00e9hension de quelques concepts de cybers\u00e9curit\u00e9,<\/li>\n\n\n\n<li>Les mettre en relation avec des r\u00e9f\u00e9rences culturelles connues des \u00e9l\u00e8ves,<\/li>\n\n\n\n<li>Encourager une production cr\u00e9ative mobilisant ces acquis.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">La d\u00e9marche par \u00e9tape<\/h2>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>1. Comprendre les concepts de cybers\u00e9curit\u00e9&nbsp;<\/strong><\/summary>\n<p>Dans un premier temps, une activit\u00e9 interactive, disponible en <a href=\"https:\/\/view.genially.com\/6961158bd7bae9282d1424d6\/interactive-content-emi-cybersecu\" data-type=\"link\" data-id=\"https:\/\/view.genially.com\/6961158bd7bae9282d1424d6\/interactive-content-emi-cybersecu\" target=\"_blank\" rel=\"noreferrer noopener\">fran\u00e7ais<\/a> ou en <a href=\"https:\/\/view.genially.com\/69a7fa026239322bf2906bad\" data-type=\"link\" data-id=\"https:\/\/view.genially.com\/69a7fa026239322bf2906bad\" target=\"_blank\" rel=\"noreferrer noopener\">corse<\/a>, permet de poser le contexte et de conna\u00eetre quelques uns des usages des \u00e9l\u00e8ves. Ces derniers sont ensuite amen\u00e9s \u00e0 <strong>d\u00e9couvrir des notions fondamentales de cybers\u00e9curit\u00e9<\/strong>. Individuellement ou en petits groupes, ils peuvent r\u00e9fl\u00e9chir \u00e0 certains concepts \u00e0 l&rsquo;aide d&rsquo;un jeu de cartes \u00e0 associer. Enfin, une application interactive fonctionnant sur ce principe de\u00a0cartes \u00e0 associer permet de faire un bilan collectif et de clarifier ces notions.<\/p>\n\n\n\n<p>Il s&rsquo;agit ici d&rsquo;associer :<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>un&nbsp;concept de cybers\u00e9curit\u00e9&nbsp;(ex. protection des donn\u00e9es, g\u00e9olocalisation, mot de passe\u2026)<\/li>\n\n\n\n<li>une&nbsp;d\u00e9finition adapt\u00e9e \u00e0 l\u2019\u00e2ge des \u00e9l\u00e8ves&nbsp;et formul\u00e9e avec des mots simples<\/li>\n\n\n\n<li>un&nbsp;exemple concret pour illustrer le concept<\/li>\n\n\n\n<li>une&nbsp;bonne pratique&nbsp;\u00e0 adopter.<\/li>\n<\/ol>\n\n\n\n<p>Ce travail d\u2019association permet :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>de clarifier le vocabulaire li\u00e9 au num\u00e9rique,<\/li>\n\n\n\n<li>de donner du sens aux r\u00e8gles de s\u00e9curit\u00e9 souvent per\u00e7ues comme abstraites,<\/li>\n\n\n\n<li>de favoriser les \u00e9changes oraux et la r\u00e9flexion collective,<\/li>\n\n\n\n<li>d\u2019installer progressivement une culture commune de la cybers\u00e9curit\u00e9.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/nuage03.apps.education.fr\/index.php\/s\/fxr2qLrGicd6xDL\" target=\"_blank\" rel=\"noreferrer noopener\">Jeu de cartes \u00e0 imprimer<\/a><\/div>\n\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/emi-cybersecurite-1d-4ce9ce.forge.apps.education.fr\/\" target=\"_blank\" rel=\"noreferrer noopener\">Application interactive<\/a><\/div>\n<\/div>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>2. Mettre en relation contes traditionnels et concepts de cybers\u00e9curit\u00e9<\/strong>&nbsp;<\/summary>\n<p>Dans un second temps, les \u00e9l\u00e8ves sont encourag\u00e9s \u00e0 repenser les contes traditionnels \u00e0 l\u2019\u00e8re du num\u00e9rique \u00e0 partir de la probl\u00e9matique suivante&nbsp;: si les mauvaises pratiques num\u00e9riques s\u2019invitaient dans les contes ?<\/p>\n\n\n\n<p>\u00c0 l\u2019aide d\u2019un jeu de cartes \u00e0 associer, les \u00e9l\u00e8ves cherchent d\u2019abord \u00e0 \u00e9tablir des liens entre certains passages de contes et les concepts de cybers\u00e9curit\u00e9 pr\u00e9c\u00e9demment abord\u00e9s. Ensuite une application interactive reprenant les situations du jeu de cartes peut \u00eatre utilis\u00e9e pour d\u00e9battre et organiser une r\u00e9flexion collective.&nbsp;<\/p>\n\n\n\n<p>Cette mise en perspective permet de montrer que, si les technologies \u00e9voluent, les principes de vigilance, de responsabilit\u00e9 et de protection restent essentiels et existent depuis toujours. Il est donc important de les conna\u00eetre et de prendre l\u2019habitude de les mettre en \u0153uvre.&nbsp;<\/p>\n\n\n\n<p>Les contes deviennent ainsi un support d\u2019analyse et de r\u00e9flexion symbolique :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>la protection des donn\u00e9es peut faire \u00e9cho \u00e0 la prudence face aux inconnus,<\/li>\n\n\n\n<li>les mots de passe rappellent la n\u00e9cessit\u00e9 de prot\u00e9ger ce qui est pr\u00e9cieux,<\/li>\n\n\n\n<li>les ruses, d\u00e9guisements ou fausses promesses rencontr\u00e9s dans les r\u00e9cits peuvent faire \u00e9cho \u00e0 de faux profils ou des pratiques trompeuses\u2026&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>En \u00e9tablissant ces parall\u00e8les, les \u00e9l\u00e8ves comprennent que les enjeux actuels de la cybers\u00e9curit\u00e9 prolongent des probl\u00e9matiques anciennes, d\u00e9j\u00e0 pr\u00e9sentes dans les r\u00e9cits fondateurs de la litt\u00e9rature jeunesse.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/nuage03.apps.education.fr\/index.php\/s\/Aya3yMPBs3ekcRi\" target=\"_blank\" rel=\"noreferrer noopener\">Jeu de cartes \u00e0 imprimer<\/a><\/div>\n\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/emi-contes-traditionnels-et-cybersecurite-209d6a.forge.apps.education.fr\/\" target=\"_blank\" rel=\"noreferrer noopener\">Application interactive<\/a><\/div>\n<\/div>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>3. Cr\u00e9er des affiches autour des bonnes pratiques num\u00e9riques<\/strong><\/summary>\n<p>La troisi\u00e8me et derni\u00e8re \u00e9tape vise \u00e0 placer les \u00e9l\u00e8ves en situation de&nbsp;<strong>production et de communication<\/strong>. Elle&nbsp;est inspir\u00e9e d\u2019une campagne nationale&nbsp;de communication&nbsp;qui s&rsquo;intitule \u00ab\u00a0<a href=\"https:\/\/www.cybermalveillance.gouv.fr\/tous-nos-contenus\/actualites\/cybermois-2025-kit-de-communication\" target=\"_blank\" rel=\"noreferrer noopener\">Histoire de Cyber<\/a>\u00a0\u00bb et qui met en parall\u00e8le, de fa\u00e7on originale, des faits historiques avec des conseils sur le bon usage des outils num\u00e9riques.&nbsp;<\/p>\n\n\n\n<p>Sur ce principe, il s\u2019agit ici d\u2019aboutir \u00e0 la cr\u00e9ation d\u2019affiches au format A3 associant :<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>un&nbsp;personnage d&rsquo;un conte traditionnel,<\/li>\n\n\n\n<li>un&nbsp;concept de cybers\u00e9curit\u00e9,<\/li>\n\n\n\n<li>une phrase<strong>&nbsp;<\/strong>percutante mettant en relation une pratique num\u00e9rique&nbsp;et un \u00e9l\u00e9ment cl\u00e9 du conte,<\/li>\n\n\n\n<li>la formulation d&rsquo;une bonne pratique \u00e0 retenir et \u00e0 adopter.<\/li>\n<\/ol>\n\n\n\n<p>Ces productions peuvent \u00eatre r\u00e9alis\u00e9es enti\u00e8rement sur papier ou en version num\u00e9rique. Ce travail de cr\u00e9ation favorise l\u2019appropriation active des connaissances tout en offrant la possibilit\u00e9 de transmettre un message de pr\u00e9vention.<\/p>\n\n\n\n<p>Les affiches ainsi produites peuvent devenir de v\u00e9ritables supports de sensibilisation, porteuses de messages clairs et accessibles, pens\u00e9s par et pour les \u00e9l\u00e8ves. Ces productions constitueront une&nbsp;campagne de sensibilisation aux bons usages du num\u00e9rique, valorisant le travail des \u00e9l\u00e8ves et renfor\u00e7ant une culture commune de la cybers\u00e9curit\u00e9 d\u00e8s le premier degr\u00e9. Pour cela, les affiches cr\u00e9es peuvent \u00eatre d\u00e9pos\u00e9es \u00e0 l&rsquo;aide du formulaire ci-dessous.<\/p>\n\n\n<div class=\"forminator-ui forminator-custom-form forminator-custom-form-7672 forminator-design--default  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-7672\" data-uid=\"69d09e86d25ca\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-7672\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-7672 forminator-design--default  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"7672\"\n\t\t\t\tenctype=\"multipart\/form-data\" data-color-option=\"theme\" data-design=\"default\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69d09e86d25ca\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div class=\"forminator-row\"><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69d09e86d25ca\" id=\"forminator-field-name-1_69d09e86d25ca-label\" class=\"forminator-label\">Nom de l&#039;\u00e9cole<\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"\" id=\"forminator-field-name-1_69d09e86d25ca\" class=\"forminator-input forminator-name--field\" aria-required=\"false\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69d09e86d25ca\" id=\"forminator-field-email-1_69d09e86d25ca-label\" class=\"forminator-label\">Adresse de messagerie acad\u00e9mique<\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"\" id=\"forminator-field-email-1_69d09e86d25ca\" class=\"forminator-input forminator-email--field\" data-required=\"\" aria-required=\"false\" autocomplete=\"email\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69d09e86d25ca\" id=\"forminator-field-textarea-1_69d09e86d25ca-label\" class=\"forminator-label\">Niveau de classe<\/label><textarea name=\"textarea-1\" placeholder=\"\" id=\"forminator-field-textarea-1_69d09e86d25ca\" class=\"forminator-textarea\" rows=\"6\" style=\"min-height:140px;\" ><\/textarea><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"upload-1\" class=\"forminator-field-upload forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-upload-1_69d09e86d25ca\" id=\"forminator-field-upload-1_69d09e86d25ca-label\" class=\"forminator-label\">T\u00e9l\u00e9verser votre production<\/label><div class=\"forminator-file-upload \" data-element=\"upload-1_69d09e86d25ca\"><input type=\"file\" name=\"upload-1\" id=\"forminator-field-upload-1_69d09e86d25ca\" class=\"forminator-input-file\" accept=\".jpg,.jpeg,.jpe,.png,.gif,.webp,.mov,.qt,.avif,.avi,.mpeg,.mpg,.mpe,.3gp,.3gpp,.3g2,.3gp2,.mid,.midi,.pdf,.doc,.docx,.docm,.pot,.pps,.ppt,.pptx,.pptm,.odt,.ppsx,.ppsm,.xla,.xls,.xlt,.xlw,.xlsx,.xlsm,.xlsb,.key,.mp3,.m4a,.m4b,.ogg,.oga,.flac,.wav,.x-wav,.mp4,.m4v,.webm,.ogv,.flv,.zip,.gz,.gzip,.ods,.odp,.7z,.bz2,.tgz,.txz,.txt,.xz,.h5p,.flipchart\" tabindex=\"-1\"><button id=\"forminator-field-upload-1_69d09e86d25ca_button\" class=\"forminator-button forminator-button-upload\" data-id=\"forminator-field-upload-1_69d09e86d25ca\">Choisissez un fichier<\/button><span data-empty-text=\"Aucun fichier s\u00e9lectionn\u00e9\">Aucun fichier s\u00e9lectionn\u00e9<\/span><button class=\"forminator-button-delete\" style=\"display: none;\"><i class=\"forminator-icon-close\" aria-hidden=\"true\"><\/i><span class=\"forminator-screen-reader-only\">Supprimer le fichier t\u00e9l\u00e9vers\u00e9<\/span><\/button><\/div><\/div><\/div><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><div class=\"forminator-row forminator-row-last\"><div class=\"forminator-col\"><div class=\"forminator-field\"><button class=\"forminator-button forminator-button-submit\">Envoyer<\/button><\/div><\/div><\/div><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"f811ec4d0a\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/1d2b\/wp-json\/wp\/v2\/posts\/7517\" \/><input type=\"hidden\" name=\"form_id\" value=\"7672\"><input type=\"hidden\" name=\"page_id\" value=\"7517\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/sites.ac-corse.fr\/1d2b\/2026\/01\/05\/les-bonnes-pratiques-numeriques\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><\/form>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\">Une infographie r\u00e9sumant la d\u00e9marche propos\u00e9e.<\/h3>\n\n\n\n<div\n    class='wp-block-pdfp-pdf-poster  alignnone'\n    id='block-1'\n    data-attributes='{&quot;file&quot;:&quot;https:\\\/\\\/sites.ac-corse.fr\\\/1d2b\\\/wp-content\\\/uploads\\\/sites\\\/46\\\/2026\\\/01\\\/Cybersecurite-et-contes.pdf&quot;,&quot;btnStyles&quot;:{&quot;background&quot;:&quot;#2271b1&quot;,&quot;color&quot;:&quot;#fff&quot;,&quot;fontSize&quot;:&quot;16px&quot;,&quot;padding&quot;:{&quot;top&quot;:10,&quot;right&quot;:20,&quot;bottom&quot;:10,&quot;left&quot;:10}},&quot;align&quot;:&quot;none&quot;,&quot;alignment&quot;:&quot;left&quot;,&quot;title&quot;:&quot;&quot;,&quot;titleFontSize&quot;:&quot;16px&quot;,&quot;height&quot;:{&quot;desktop&quot;:&quot;840px&quot;,&quot;tablet&quot;:&quot;700px&quot;,&quot;mobile&quot;:&quot;400px&quot;},&quot;width&quot;:{&quot;desktop&quot;:&quot;100%&quot;,&quot;tablet&quot;:&quot;100%&quot;,&quot;mobile&quot;:&quot;100%&quot;},&quot;showName&quot;:false,&quot;print&quot;:false,&quot;onlyPDF&quot;:false,&quot;defaultBrowser&quot;:false,&quot;downloadButton&quot;:false,&quot;downloadButtonText&quot;:&quot;Download File&quot;,&quot;fullscreenButton&quot;:true,&quot;fullscreenButtonText&quot;:&quot;View Fullscreen&quot;,&quot;actionsPosition&quot;:&quot;top&quot;,&quot;newWindow&quot;:false,&quot;protect&quot;:false,&quot;thumbMenu&quot;:false,&quot;sidebarOpen&quot;:false,&quot;initialPage&quot;:0,&quot;alert&quot;:false,&quot;lastVersion&quot;:false,&quot;hrScroll&quot;:false,&quot;isHideRightToolbar&quot;:false,&quot;additional&quot;:{&quot;ID&quot;:&quot;&quot;,&quot;Class&quot;:&quot;&quot;,&quot;CSS&quot;:&quot;&quot;},&quot;adobeEmbedder&quot;:false,&quot;adobeOptions&quot;:{&quot;showDownloadPDF&quot;:true,&quot;showPrintPDF&quot;:true,&quot;showAnnotationTools&quot;:true,&quot;showFullScreen&quot;:false,&quot;embedMode&quot;:&quot;SIZED_CONTAINER&quot;},&quot;popupOptions&quot;:{&quot;enabled&quot;:false,&quot;triggerType&quot;:&quot;button&quot;,&quot;image&quot;:&quot;&quot;,&quot;imagePdfIcon&quot;:true,&quot;imageHeight&quot;:&quot;200px&quot;,&quot;imageWidth&quot;:&quot;300px&quot;,&quot;text&quot;:&quot;Open PDF&quot;,&quot;btnStyle&quot;:{&quot;background&quot;:&quot;#2271b1&quot;,&quot;color&quot;:&quot;#fff&quot;,&quot;fontSize&quot;:&quot;16px&quot;,&quot;padding&quot;:{&quot;top&quot;:10,&quot;right&quot;:20,&quot;bottom&quot;:10,&quot;left&quot;:10}}},&quot;popupBtnStyle&quot;:{&quot;background&quot;:&quot;#2271b1&quot;,&quot;color&quot;:&quot;#fff&quot;,&quot;padding&quot;:{&quot;top&quot;:10,&quot;right&quot;:20,&quot;bottom&quot;:10,&quot;left&quot;:10}},&quot;popupBtnText&quot;:&quot;Open Document&quot;,&quot;CSS&quot;:&quot;&quot;,&quot;socialShare&quot;:{&quot;enabled&quot;:false,&quot;facebook&quot;:true,&quot;twitter&quot;:true,&quot;linkedin&quot;:true,&quot;pinterest&quot;:true,&quot;position&quot;:&quot;top&quot;},&quot;isPremium&quot;:false}'\n    style=\"text-align: left\">\n    \n        <iframe loading=\"lazy\" title=\"\" style=\"border:0;\" width=\"100%\" height=\"800px\" class=\"pdfp_unsupported_frame\" src=\"\/\/docs.google.com\/gview?embedded=true&#038;url=https:\/\/sites.ac-corse.fr\/1d2b\/wp-content\/uploads\/sites\/46\/2026\/01\/Cybersecurite-et-contes.pdf\"><\/iframe>\n\n    <\/div>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\">Pour aller plus loin<\/h3>\n\n\n\n<p>Pour approfondir le travail sur la protection des donn\u00e9es personnelles, un parcours interactif cl\u00e9 en main en \u00e9ducation aux m\u00e9dias est \u00e9galement disponible <a href=\"https:\/\/sites.ac-corse.fr\/1d2b\/2025\/02\/11\/decouvrir-et-pratiquer-lemi-au-cycle-3\/\" target=\"_blank\" rel=\"noreferrer noopener\">ici<\/a>.<\/p>\n\n\n<\/details>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n","protected":false},"excerpt":{"rendered":"<p>Cette action aupr\u00e8s des \u00e9l\u00e8ves peut contribuer \u00e0 la mise en oeuvre du programme Phare et de l&rsquo;axe 3 du projet Acad\u00e9mique. Les usages num\u00e9riques s\u2019installent de plus en plus t\u00f4t dans la vie des \u00e9l\u00e8ves. Pour se construire une culture num\u00e9rique responsable, ils doivent apprendre \u00e0 adopter de bons r\u00e9flexes et \u00e0 d\u00e9velopper leur [&hellip;]<\/p>\n","protected":false},"author":93,"featured_media":7656,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[129,43,44,8],"tags":[282,152,160,163,127,45,280],"class_list":["post-7517","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-en-classe","category-numerique","category-tablettes","category-tbi","tag-axe3projet-academique","tag-ce2","tag-cm1","tag-cm2","tag-gratuit","tag-numerique","tag-phare"],"_links":{"self":[{"href":"https:\/\/sites.ac-corse.fr\/1d2b\/wp-json\/wp\/v2\/posts\/7517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.ac-corse.fr\/1d2b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.ac-corse.fr\/1d2b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.ac-corse.fr\/1d2b\/wp-json\/wp\/v2\/users\/93"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.ac-corse.fr\/1d2b\/wp-json\/wp\/v2\/comments?post=7517"}],"version-history":[{"count":79,"href":"https:\/\/sites.ac-corse.fr\/1d2b\/wp-json\/wp\/v2\/posts\/7517\/revisions"}],"predecessor-version":[{"id":8228,"href":"https:\/\/sites.ac-corse.fr\/1d2b\/wp-json\/wp\/v2\/posts\/7517\/revisions\/8228"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.ac-corse.fr\/1d2b\/wp-json\/wp\/v2\/media\/7656"}],"wp:attachment":[{"href":"https:\/\/sites.ac-corse.fr\/1d2b\/wp-json\/wp\/v2\/media?parent=7517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.ac-corse.fr\/1d2b\/wp-json\/wp\/v2\/categories?post=7517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.ac-corse.fr\/1d2b\/wp-json\/wp\/v2\/tags?post=7517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}