{"id":331,"date":"2021-05-26T19:32:43","date_gmt":"2021-05-26T18:32:43","guid":{"rendered":"https:\/\/virtualperson.org\/deja-vu\/?p=331"},"modified":"2021-05-26T19:33:34","modified_gmt":"2021-05-26T18:33:34","slug":"mots-clefs","status":"publish","type":"post","link":"https:\/\/virtualperson.org\/deja-vu\/mots-clefs\/","title":{"rendered":"Mots clefs"},"content":{"rendered":"<p><span style=\"font-family: Avenir Next Condensed;\"><span style=\"font-size: small;\"><b>Mots clefs<\/b><\/span><\/span><\/p>\n<p><span style=\"font-family: Avenir Next Condensed;\"><span style=\"font-size: small;\">-un ordinateur<br \/>\n<\/span><\/span><span style=\"font-family: Avenir Next Condensed;\"><span style=\"font-size: small;\">-un \u00e9cran<br \/>\n-un navigateur<br \/>\n<\/span><\/span><span style=\"font-family: Avenir Next Condensed;\"><span style=\"font-size: small;\">-un logiciel<br \/>\n<\/span><\/span><span style=\"font-size: small; font-family: 'Avenir Next Condensed';\">-un internaute<br \/>\n<\/span><span style=\"font-size: small; font-family: 'Avenir Next Condensed';\">-l&#8217;informatique<br \/>\n<\/span><span style=\"font-size: small; font-family: 'Avenir Next Condensed';\">-le num\u00e9rique<br \/>\n<\/span><span style=\"font-family: Avenir Next Condensed;\"><span style=\"font-size: small;\">-la connexion<br \/>\n-la cybern\u00e9tique<br \/>\n<\/span><\/span><span style=\"font-family: Avenir Next Condensed;\"><span style=\"font-size: small;\">-les algorithmes<br \/>\n<\/span><\/span><span style=\"font-family: Avenir Next Condensed;\"><span style=\"font-size: small;\">-les r\u00e9seaux sociaux<br \/>\n-la r\u00e9alit\u00e9 augment\u00e9e<br \/>\n<\/span><\/span><span style=\"font-family: Avenir Next Condensed;\"><span style=\"font-size: small;\">-le net-art ou le netart<br \/>\n-les web-radios<br \/>\n<\/span><\/span><span style=\"font-family: Avenir Next Condensed;\"><span style=\"font-size: small;\">-un pirate informatique (un &#8216;hacker&#8217; )<br \/>\n-une adresse email, un email, un courriel<br \/>\n<\/span><\/span><span style=\"font-family: Avenir Next Condensed;\"><span style=\"font-size: small;\">-un spam ou un pourriel<br \/>\n<\/span><\/span><span style=\"font-family: Avenir Next Condensed;\"><span style=\"font-size: small;\">-une pi\u00e8ce jointe<br \/>\n<\/span><\/span><span style=\"font-family: Avenir Next Condensed;\"><span style=\"font-size: small;\">-t\u00e9l\u00e9charger un fichier<\/span><\/span><\/p>\n<p><span style=\"font-family: Avenir Next Condensed;\"><span style=\"font-size: small;\"><span style=\"color: #000000;\"><span style=\"font-family: AvenirNextCondensed-Regular;\"><b>Quelques phrases clefs:<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: AvenirNextCondensed-Regular;\"><br \/>\n-XX\u00a0n\u2019est pas une exposition virtuelle mais une exposition d\u2019\u0153uvres virtuelles con\u00e7ues pour \u00eatre vues sur un \u00e9cran, un laptop, une tablette ou un smartphone<br \/>\n-des\u00a0cr\u00e9ations interactives con\u00e7ues par, pour et avec le r\u00e9seau Internet.<br \/>\n&#8211; un outil de communication, de cr\u00e9ation et d\u2019\u00e9mancipation de la soci\u00e9t\u00e9, des artistes et de leurs pratiques<br \/>\n-Les esth\u00e9tiques et les protocoles des \u0153uvres \u00e9voluent constamment<br \/>\n-Le mouvement post-internet d\u00e9crit les pratiques des artistes qui, contrairement \u00e0 celles des g\u00e9n\u00e9rations pr\u00e9c\u00e9dentes, utilisent le web juste comme un autre m\u00e9dium, comme la peinture ou la sculpture. Leurs \u0153uvres se d\u00e9placent de mani\u00e8re fluide entre les espaces, apparaissant parfois sur un \u00e9cran, d\u2019autres fois expos\u00e9es dans une galerie.<\/span><\/span><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mots clefs -un ordinateur -un \u00e9cran -un navigateur -un logiciel -un internaute -l&#8217;informatique -le num\u00e9rique -la connexion -la cybern\u00e9tique -les algorithmes -les r\u00e9seaux sociaux -la r\u00e9alit\u00e9 augment\u00e9e -le net-art ou le netart -les web-radios -un pirate informatique (un &#8216;hacker&#8217; ) -une adresse email, un email, un courriel -un spam ou un pourriel -une pi\u00e8ce jointe [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-331","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/virtualperson.org\/deja-vu\/wp-json\/wp\/v2\/posts\/331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/virtualperson.org\/deja-vu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/virtualperson.org\/deja-vu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/virtualperson.org\/deja-vu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/virtualperson.org\/deja-vu\/wp-json\/wp\/v2\/comments?post=331"}],"version-history":[{"count":1,"href":"https:\/\/virtualperson.org\/deja-vu\/wp-json\/wp\/v2\/posts\/331\/revisions"}],"predecessor-version":[{"id":332,"href":"https:\/\/virtualperson.org\/deja-vu\/wp-json\/wp\/v2\/posts\/331\/revisions\/332"}],"wp:attachment":[{"href":"https:\/\/virtualperson.org\/deja-vu\/wp-json\/wp\/v2\/media?parent=331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/virtualperson.org\/deja-vu\/wp-json\/wp\/v2\/categories?post=331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/virtualperson.org\/deja-vu\/wp-json\/wp\/v2\/tags?post=331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}