vault backup: 2023-04-25 13:45:13
This commit is contained in:
13233
.obsidian/plugins/obsidian-completr/scanned_words.txt
vendored
13233
.obsidian/plugins/obsidian-completr/scanned_words.txt
vendored
File diff suppressed because it is too large
Load Diff
62
.obsidian/workspace.json
vendored
62
.obsidian/workspace.json
vendored
@@ -9,31 +9,18 @@
|
||||
"dimension": 55.520504731861195,
|
||||
"children": [
|
||||
{
|
||||
"id": "37f397ecb6b62143",
|
||||
"id": "7b8d23c7f129c617",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "markdown",
|
||||
"state": {
|
||||
"file": "Algorithmen und Datenstrukturen/UEB03/UEB03.md",
|
||||
"mode": "source",
|
||||
"source": false
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "ab8b2b633584c3c4",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "markdown",
|
||||
"state": {
|
||||
"file": "CCN/Ex02/Exercise 2.md",
|
||||
"file": "English/KW17.md",
|
||||
"mode": "source",
|
||||
"source": false
|
||||
}
|
||||
}
|
||||
}
|
||||
],
|
||||
"currentTab": 1
|
||||
]
|
||||
},
|
||||
{
|
||||
"id": "47553fa673bb1eb6",
|
||||
@@ -41,12 +28,12 @@
|
||||
"dimension": 44.479495268138805,
|
||||
"children": [
|
||||
{
|
||||
"id": "bcaf3871b8b4e072",
|
||||
"id": "2f5b48cd2abeb77f",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "pdf",
|
||||
"state": {
|
||||
"file": "CCN/Ex02/ccn1-exercise2.pdf"
|
||||
"file": "English/Matters Technik - IT Matters 3rd EditionB1B2 - Englisch Für IT-Berufe Schülerbuch (Isobel E. Williams) (Z-Library).pdf"
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -67,9 +54,9 @@
|
||||
"id": "b8336cb3c3d06be9",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "file-explorer",
|
||||
"type": "diagram-edit",
|
||||
"state": {
|
||||
"sortOrder": "alphabetical"
|
||||
"file": "Untitled Diagram.svg"
|
||||
}
|
||||
}
|
||||
},
|
||||
@@ -95,12 +82,23 @@
|
||||
"type": "starred",
|
||||
"state": {}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "c9a36b89afbe26ec",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "file-explorer",
|
||||
"state": {
|
||||
"sortOrder": "alphabetical"
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
],
|
||||
"currentTab": 3
|
||||
}
|
||||
],
|
||||
"direction": "horizontal",
|
||||
"width": 300
|
||||
"width": 379.5
|
||||
},
|
||||
"right": {
|
||||
"id": "70ae06261ef3fc74",
|
||||
@@ -116,7 +114,7 @@
|
||||
"state": {
|
||||
"type": "backlink",
|
||||
"state": {
|
||||
"file": "CCN/Ex02/ccn1-exercise2.pdf",
|
||||
"file": "English/KW17.md",
|
||||
"collapseAll": false,
|
||||
"extraContext": false,
|
||||
"sortOrder": "alphabetical",
|
||||
@@ -133,7 +131,7 @@
|
||||
"state": {
|
||||
"type": "outgoing-link",
|
||||
"state": {
|
||||
"file": "CCN/Ex02/ccn1-exercise2.pdf",
|
||||
"file": "English/KW17.md",
|
||||
"linksCollapsed": false,
|
||||
"unlinkedCollapsed": true
|
||||
}
|
||||
@@ -156,7 +154,7 @@
|
||||
"state": {
|
||||
"type": "outline",
|
||||
"state": {
|
||||
"file": "CCN/Ex02/ccn1-exercise2.pdf"
|
||||
"file": "English/KW17.md"
|
||||
}
|
||||
}
|
||||
},
|
||||
@@ -217,8 +215,13 @@
|
||||
"obsidian-wordnet-plugin:WordNet Dictionary": false
|
||||
}
|
||||
},
|
||||
"active": "bcaf3871b8b4e072",
|
||||
"active": "7b8d23c7f129c617",
|
||||
"lastOpenFiles": [
|
||||
"English/Matters Technik - IT Matters 3rd EditionB1B2 - Englisch Für IT-Berufe Schülerbuch (Isobel E. Williams) (Z-Library).pdf",
|
||||
"Untitled Diagram.svg",
|
||||
"English/KW17.md",
|
||||
"CCN/Ex02/ccn1-exercise2.pdf",
|
||||
"English",
|
||||
"CCN/Ex02/Exercise 2.md",
|
||||
"Mathe/KW17/KW17.md",
|
||||
"Mathe/KW17/KW17-GeoTra.pdf",
|
||||
@@ -228,10 +231,7 @@
|
||||
"Informationssicherheit/Ueb3/Ueb3.md",
|
||||
"Informationssicherheit/VL/04-recht-standards-handout.pdf",
|
||||
"Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf",
|
||||
"CCN/Ex02/ccn1-exercise2.pdf",
|
||||
"Informationssicherheit/Ueb3",
|
||||
"CCN/Ex02",
|
||||
"Mathe/KW17/KW17-GeoTra_vor.pdf",
|
||||
"Informationssicherheit/Ueb2/Ueb2.md",
|
||||
"Algorithmen und Datenstrukturen/UEB03/UEB03.md",
|
||||
"Mathe/KW16/UEB.md",
|
||||
@@ -255,14 +255,12 @@
|
||||
"Informationssicherheit/Ueb1/20230331_10h28m24s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_10h28m43s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_14h12m43s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_16h17m48s_grim.png",
|
||||
"Informationssicherheit/Ueb1/Ueb01.md",
|
||||
"Algorithmen und Datenstrukturen/UEB01/UEB01.md",
|
||||
"2023-04-16.md",
|
||||
"FH/2023-04-16.md",
|
||||
"FH/Informationssicherheit/Ueb1/Ueb01.md",
|
||||
"FH/Informationssicherheit/Ueb01.md",
|
||||
"FH/Algorithmen und Datenstrukturen/UEB01.md",
|
||||
"FH/CCN/VL01.md"
|
||||
"FH/Algorithmen und Datenstrukturen/UEB01.md"
|
||||
]
|
||||
}
|
||||
0
English/KW17.md
Normal file
0
English/KW17.md
Normal file
Binary file not shown.
18
Untitled Diagram.svg
Normal file
18
Untitled Diagram.svg
Normal file
File diff suppressed because one or more lines are too long
|
After Width: | Height: | Size: 136 KiB |
Reference in New Issue
Block a user