{"id":30932,"date":"2025-07-10T11:15:07","date_gmt":"2025-07-10T09:15:07","guid":{"rendered":"https:\/\/cyberbuddyproject.eu\/?post_type=lesson&#038;p=30932"},"modified":"2025-07-10T11:15:09","modified_gmt":"2025-07-10T09:15:09","slug":"exigir-explicacoes-para-os-atos-dos-outros","status":"publish","type":"lesson","link":"https:\/\/cyberbuddyproject.eu\/pt-pt\/lesson\/exigir-explicacoes-para-os-atos-dos-outros\/","title":{"rendered":"Exigir explica\u00e7\u00f5es para os atos dos outros"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"884\" height=\"884\" src=\"https:\/\/cyberbuddyproject.eu\/wp-content\/uploads\/2025\/02\/IIT6.png\" alt=\"\" class=\"wp-image-22648\" srcset=\"https:\/\/cyberbuddyproject.eu\/wp-content\/uploads\/2025\/02\/IIT6.png 884w, https:\/\/cyberbuddyproject.eu\/wp-content\/uploads\/2025\/02\/IIT6-300x300.png 300w, https:\/\/cyberbuddyproject.eu\/wp-content\/uploads\/2025\/02\/IIT6-150x150.png 150w, https:\/\/cyberbuddyproject.eu\/wp-content\/uploads\/2025\/02\/IIT6-768x768.png 768w, https:\/\/cyberbuddyproject.eu\/wp-content\/uploads\/2025\/02\/IIT6-100x100.png 100w\" sizes=\"(max-width: 884px) 100vw, 884px\" \/><\/figure>\n\n\n<p>Isabel exige uma explica\u00e7\u00e3o a Pedro sobre o facto de n\u00e3o ter criado ele pr\u00f3prio um novo endere\u00e7o de correio eletr\u00f3nico. Depois de a sua resposta n\u00e3o ser clara, Isabel decide criar um novo endere\u00e7o de correio eletr\u00f3nico e d\u00e1 a Pedro acesso ao mesmo. Pedro responde que h\u00e1 um problema com esse e-mail e pede novamente o seu endere\u00e7o pessoal e a sua palavra-passe.<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>Isabel exige uma explica\u00e7\u00e3o a Pedro sobre o facto de ele pr\u00f3prio n\u00e3o ter criado um novo endere\u00e7o de correio eletr\u00f3nico.<\/p>\n","protected":false},"featured_media":22644,"template":"","meta":{"_initial_content":"","_new_post":false,"_quiz_has_questions":true,"_lesson_complexity":"easy","_lesson_length":15,"_lesson_course":30942,"_lesson_preview":"preview"},"lesson-tag":[],"class_list":["post-30932","lesson","type-lesson","status-publish","has-post-thumbnail","hentry","module-falsificacao-e-roubo-de-identidade","post"],"is_coteacher":false,"_links":{"self":[{"href":"https:\/\/cyberbuddyproject.eu\/pt-pt\/wp-json\/wp\/v2\/lessons\/30932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberbuddyproject.eu\/pt-pt\/wp-json\/wp\/v2\/lessons"}],"about":[{"href":"https:\/\/cyberbuddyproject.eu\/pt-pt\/wp-json\/wp\/v2\/types\/lesson"}],"version-history":[{"count":3,"href":"https:\/\/cyberbuddyproject.eu\/pt-pt\/wp-json\/wp\/v2\/lessons\/30932\/revisions"}],"predecessor-version":[{"id":30955,"href":"https:\/\/cyberbuddyproject.eu\/pt-pt\/wp-json\/wp\/v2\/lessons\/30932\/revisions\/30955"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberbuddyproject.eu\/pt-pt\/wp-json\/wp\/v2\/media\/22644"}],"wp:attachment":[{"href":"https:\/\/cyberbuddyproject.eu\/pt-pt\/wp-json\/wp\/v2\/media?parent=30932"}],"wp:term":[{"taxonomy":"lesson-tag","embeddable":true,"href":"https:\/\/cyberbuddyproject.eu\/pt-pt\/wp-json\/wp\/v2\/lesson-tag?post=30932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}