vault backup: 2023-05-31 14:33:23
This commit is contained in:
33
.obsidian/workspace.json
vendored
33
.obsidian/workspace.json
vendored
@@ -36,9 +36,11 @@
|
||||
"id": "ac30fcb197f4fd3d",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "release-notes",
|
||||
"type": "markdown",
|
||||
"state": {
|
||||
"currentVersion": "1.3.4"
|
||||
"file": "Informationssicherheit/Ueb6/Ueb 6.md",
|
||||
"mode": "preview",
|
||||
"source": false
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -69,8 +71,19 @@
|
||||
"file": "English/Matters Technik - IT Matters 3rd EditionB1B2 - Englisch Für IT-Berufe Schülerbuch (Isobel E. Williams) (Z-Library).pdf"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "9a3ca912f94ab62b",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "pdf",
|
||||
"state": {
|
||||
"file": "Informationssicherheit/Ueb6/06-ueb_uebungsblatt.pdf"
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
],
|
||||
"currentTab": 2
|
||||
}
|
||||
],
|
||||
"direction": "vertical"
|
||||
@@ -144,7 +157,7 @@
|
||||
"state": {
|
||||
"type": "backlink",
|
||||
"state": {
|
||||
"file": "Informationssicherheit/Ueb5/Ueb5.md",
|
||||
"file": "Informationssicherheit/Ueb6/Ueb 6.md",
|
||||
"collapseAll": false,
|
||||
"extraContext": false,
|
||||
"sortOrder": "alphabetical",
|
||||
@@ -161,7 +174,7 @@
|
||||
"state": {
|
||||
"type": "outgoing-link",
|
||||
"state": {
|
||||
"file": "Informationssicherheit/Ueb5/Ueb5.md",
|
||||
"file": "Informationssicherheit/Ueb6/Ueb 6.md",
|
||||
"linksCollapsed": false,
|
||||
"unlinkedCollapsed": true
|
||||
}
|
||||
@@ -184,7 +197,7 @@
|
||||
"state": {
|
||||
"type": "outline",
|
||||
"state": {
|
||||
"file": "Informationssicherheit/Ueb5/Ueb5.md"
|
||||
"file": "Informationssicherheit/Ueb6/Ueb 6.md"
|
||||
}
|
||||
}
|
||||
},
|
||||
@@ -247,6 +260,10 @@
|
||||
},
|
||||
"active": "ac30fcb197f4fd3d",
|
||||
"lastOpenFiles": [
|
||||
"Informationssicherheit/Ueb6/06-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/Ueb6/Ueb 6.md",
|
||||
"Informationssicherheit/Ueb5/new UEB5.md",
|
||||
"Informationssicherheit/Ueb6",
|
||||
"Informationssicherheit/Ueb5/05-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/Ueb4/04-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/Ueb5/Ueb5.md",
|
||||
@@ -260,8 +277,6 @@
|
||||
"Algorithmen und Datenstrukturen/VL/VL06/VL07.md",
|
||||
"Informationssicherheit/Ueb5",
|
||||
"Mathe/KW20",
|
||||
"Algorithmen und Datenstrukturen/VL/VL06/Untitled",
|
||||
"Algorithmen und Datenstrukturen/VL/VL06",
|
||||
"English/KW18.md",
|
||||
"Mathe/KW17/KW17.md",
|
||||
"Algorithmen und Datenstrukturen/UEB04/UEB4.md",
|
||||
@@ -284,8 +299,6 @@
|
||||
"Untitled 1.md",
|
||||
"Untitled.md",
|
||||
"Excalidraw/Drawing 2023-04-17 08.21.36.excalidraw.md",
|
||||
"Excalidraw/Drawing 2023-04-17 08.21.00.excalidraw.md",
|
||||
"FH/Informationssicherheit/Ueb2/Ueb2.md",
|
||||
"Informationssicherheit/Ueb1/20230330_19h30m31s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230330_19h34m13s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_07h21m13s_grim.png",
|
||||
|
||||
Reference in New Issue
Block a user