{"id":660,"date":"2024-05-19T10:12:49","date_gmt":"2024-05-19T08:12:49","guid":{"rendered":"https:\/\/doukatech.fr\/?page_id=660"},"modified":"2025-11-05T06:48:30","modified_gmt":"2025-11-05T05:48:30","slug":"pb2-ma-vie-numerique","status":"publish","type":"page","link":"https:\/\/doukatech.fr\/?page_id=660","title":{"rendered":"Pb2 &#8211; Ma vie num\u00e9rique"},"content":{"rendered":"\n<div class=\"wp-block-uagb-container uagb-block-07dd24c9 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-91ac3ae8\">\n<h2 class=\"wp-block-heading has-ast-global-color-7-color has-text-color has-link-color wp-elements-4d6b482baa175fb8f89e21e467fc8257\">Pb2 &#8211; Ma vie num\u00e9rique<\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-ast-global-color-4-color has-text-color has-link-color has-large-font-size wp-elements-269ab43c8a8444b46a7754fe293d6a35\" style=\"padding-right:0;padding-left:0\">S\u00e9ance 1 : Le tr\u00e9sor de Papi  Roger<\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-ast-global-color-3-color has-text-color has-link-color has-medium-font-size wp-elements-bbc25a4e1705da30a1190d884e59ad68\" style=\"margin-top:0px;margin-bottom:0px;padding-top:0px;padding-right:0rem;padding-bottom:0px;padding-left:0rem;font-style:italic;font-weight:200\">A travers une chasse au tr\u00e9sor num\u00e9rique, les \u00e9l\u00e8ves vont devoir manipuler des fichiers et r\u00e9soudront des \u00e9nigmes. <\/h2>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-4c35ab0f alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-c4fc879a\">\n<h2 class=\"wp-block-heading has-text-align-center has-luminous-vivid-amber-color has-text-color has-link-color has-medium-font-size wp-elements-fe2a0a90aa4a2fb0220d8acf9adf7180\">Le tr\u00e9sor de papi<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/doukatech.fr\/internet\/tresor\/tresor.html\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"360\" src=\"https:\/\/doukatech.fr\/wp-content\/uploads\/2025\/11\/tresor.jpg\" alt=\"\" class=\"wp-image-1070\" style=\"width:auto;height:200px\" srcset=\"https:\/\/doukatech.fr\/wp-content\/uploads\/2025\/11\/tresor.jpg 640w, https:\/\/doukatech.fr\/wp-content\/uploads\/2025\/11\/tresor-300x169.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-658f524f\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-8696e146\"><\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-ast-global-color-4-color has-text-color has-link-color has-large-font-size wp-elements-6dd76329cea3f172f62e7764729c18c0\" style=\"padding-right:0;padding-left:0\">S\u00e9ance 2 : La cybers\u00e9curit\u00e9<\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-ast-global-color-3-color has-text-color has-link-color has-medium-font-size wp-elements-942a28c29d493aa179f392e71f099d55\" style=\"margin-top:0px;margin-bottom:0px;padding-top:0px;padding-right:0rem;padding-bottom:0px;padding-left:0rem;font-style:italic;font-weight:200\">A travers une enqu\u00eate polici\u00e8re, les \u00e9l\u00e8ves vont \u00e9tudier les principaux domaines de la cybers\u00e9curit\u00e9.<\/h2>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-dc897cf2 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-05e6e846\">\n<h2 class=\"wp-block-heading has-text-align-center has-white-color has-text-color has-link-color has-medium-font-size wp-elements-5a079119af1a1de42574e27f3b114b57\">Feuille d&rsquo;activit\u00e9<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/doukatech.fr\/wp-content\/uploads\/2024\/05\/Pb2-Seance2-Activite-Police-cybersecurite.pdf\" type=\"application\/pdf\" style=\"width:100%;height:200px\" aria-label=\"Contenu embarqu\u00e9 Pb2-Seance2-Activite-Police-cybersecurite.\"><\/object><a id=\"wp-block-file--media-915f9a7d-5aaa-4782-a987-c7ac2e78853d\" href=\"https:\/\/doukatech.fr\/wp-content\/uploads\/2024\/05\/Pb2-Seance2-Activite-Police-cybersecurite.pdf\">Pb2-Seance2-Activite-Police-cybersecurite<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-8df3c6af\">\n<h2 class=\"wp-block-heading has-text-align-center has-luminous-vivid-amber-color has-text-color has-link-color has-medium-font-size wp-elements-180d23c93e3b4f0edb4712dfd19f2486\">Police cybers\u00e9curit\u00e9<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/doukatech.fr\/internet\/cybersecurite\/cybersecurite.html\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"360\" src=\"https:\/\/doukatech.fr\/wp-content\/uploads\/2025\/02\/cybersecurite.jpg\" alt=\"\" class=\"wp-image-879\" style=\"width:auto;height:200px\" srcset=\"https:\/\/doukatech.fr\/wp-content\/uploads\/2025\/02\/cybersecurite.jpg 640w, https:\/\/doukatech.fr\/wp-content\/uploads\/2025\/02\/cybersecurite-300x169.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-55014764\"><\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-ast-global-color-4-color has-text-color has-link-color has-large-font-size wp-elements-53f1c7eba71b016665e32d3a7f7301f7\" style=\"padding-right:0;padding-left:0\">S\u00e9ance 3 : La cyberviolence<\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-ast-global-color-3-color has-text-color has-link-color has-medium-font-size wp-elements-8a259c403056c9bd1c9b2008c512ae48\" style=\"margin-top:0px;margin-bottom:0px;padding-top:0px;padding-right:0rem;padding-bottom:0px;padding-left:0rem;font-style:italic;font-weight:200\">La cyberviolence est abord\u00e9e  \u00e0 travers des exemples et un dialogue avec les \u00e9l\u00e8ves.<\/h2>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-c60d0ef2 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-d51fe93b\">\n<h2 class=\"wp-block-heading has-text-align-center has-white-color has-text-color has-link-color has-medium-font-size wp-elements-5a079119af1a1de42574e27f3b114b57\">Feuille d&rsquo;activit\u00e9<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/doukatech.fr\/wp-content\/uploads\/2024\/05\/Pb2-Seance3-Activite-La-cyberviolence.pdf\" type=\"application\/pdf\" style=\"width:100%;height:200px\" aria-label=\"Contenu embarqu\u00e9 Pb2-Seance3-Activite-La-cyberviolence.\"><\/object><a id=\"wp-block-file--media-011a3b07-b5b0-4152-b948-28a6b7c615d7\" href=\"https:\/\/doukatech.fr\/wp-content\/uploads\/2024\/05\/Pb2-Seance3-Activite-La-cyberviolence.pdf\">Pb2-Seance3-Activite-La-cyberviolence<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-07c86ac0\">\n<h2 class=\"wp-block-heading has-text-align-center has-luminous-vivid-amber-color has-text-color has-link-color has-medium-font-size wp-elements-d8a92d11206efc8bee515c91b8d52f64\">Diaporama du cours<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/doukatech.fr\/internet\/cyberharcelement\/cyberharcelement.html\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"360\" src=\"https:\/\/doukatech.fr\/wp-content\/uploads\/2025\/02\/cyberviolence.jpg\" alt=\"\" class=\"wp-image-880\" style=\"width:auto;height:200px\" srcset=\"https:\/\/doukatech.fr\/wp-content\/uploads\/2025\/02\/cyberviolence.jpg 640w, https:\/\/doukatech.fr\/wp-content\/uploads\/2025\/02\/cyberviolence-300x169.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-bdc3777a\"><\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-pale-cyan-blue-color has-text-color has-link-color has-large-font-size wp-elements-d14b9405e51c3c48334172076591361e\" style=\"padding-right:0;padding-left:0\">Synth\u00e8se de la probl\u00e9matique 2<\/h2>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-uagb-container uagb-block-160f09d2\">\n<h2 class=\"wp-block-heading has-text-align-center has-white-color has-text-color has-link-color has-medium-font-size wp-elements-e8bddbd1397174e4d0fbd495e66d4323\">Feuille de synth\u00e8se<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/doukatech.fr\/wp-content\/uploads\/2024\/05\/Pb2-Synthese.pdf\" type=\"application\/pdf\" style=\"width:100%;height:200px\" aria-label=\"Contenu embarqu\u00e9 Pb2-Synthese.\"><\/object><a id=\"wp-block-file--media-9732aa05-d531-4513-af54-8ae19cd09b5c\" href=\"https:\/\/doukatech.fr\/wp-content\/uploads\/2024\/05\/Pb2-Synthese.pdf\">Pb2-Synthese<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-69cfe1ef\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-a8f5ab87\"><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Pb2 &#8211; Ma vie num\u00e9rique S\u00e9ance 1 : Le tr\u00e9sor de Papi Roger A travers une chasse au tr\u00e9sor num\u00e9rique, les \u00e9l\u00e8ves vont devoir manipuler des fichiers et r\u00e9soudront des \u00e9nigmes. Le tr\u00e9sor de papi S\u00e9ance 2 : La cybers\u00e9curit\u00e9 A travers une enqu\u00eate polici\u00e8re, les \u00e9l\u00e8ves vont \u00e9tudier les principaux domaines de la cybers\u00e9curit\u00e9. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":162,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-660","page","type-page","status-publish","hentry"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Drapeau","author_link":"https:\/\/doukatech.fr\/?author=1"},"uagb_comment_info":0,"uagb_excerpt":"Pb2 &#8211; Ma vie num\u00e9rique S\u00e9ance 1 : Le tr\u00e9sor de Papi Roger A travers une chasse au tr\u00e9sor num\u00e9rique, les \u00e9l\u00e8ves vont devoir manipuler des fichiers et r\u00e9soudront des \u00e9nigmes. Le tr\u00e9sor de papi S\u00e9ance 2 : La cybers\u00e9curit\u00e9 A travers une enqu\u00eate polici\u00e8re, les \u00e9l\u00e8ves vont \u00e9tudier les principaux domaines de la cybers\u00e9curit\u00e9.\u2026","_links":{"self":[{"href":"https:\/\/doukatech.fr\/index.php?rest_route=\/wp\/v2\/pages\/660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/doukatech.fr\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/doukatech.fr\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/doukatech.fr\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/doukatech.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=660"}],"version-history":[{"count":7,"href":"https:\/\/doukatech.fr\/index.php?rest_route=\/wp\/v2\/pages\/660\/revisions"}],"predecessor-version":[{"id":1071,"href":"https:\/\/doukatech.fr\/index.php?rest_route=\/wp\/v2\/pages\/660\/revisions\/1071"}],"up":[{"embeddable":true,"href":"https:\/\/doukatech.fr\/index.php?rest_route=\/wp\/v2\/pages\/162"}],"wp:attachment":[{"href":"https:\/\/doukatech.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}