vault backup: 2023-05-16 16:16:25
This commit is contained in:
34
.obsidian/workspace.json
vendored
34
.obsidian/workspace.json
vendored
@@ -13,7 +13,7 @@
|
||||
"state": {
|
||||
"type": "markdown",
|
||||
"state": {
|
||||
"file": "Informationssicherheit/Ueb4/Ueb4.md",
|
||||
"file": "Informationssicherheit/Ueb5/Ueb5.md",
|
||||
"mode": "source",
|
||||
"source": false
|
||||
}
|
||||
@@ -93,7 +93,7 @@
|
||||
"state": {
|
||||
"type": "backlink",
|
||||
"state": {
|
||||
"file": "Informationssicherheit/Ueb4/Ueb4.md",
|
||||
"file": "Informationssicherheit/Ueb5/Ueb5.md",
|
||||
"collapseAll": false,
|
||||
"extraContext": false,
|
||||
"sortOrder": "alphabetical",
|
||||
@@ -110,7 +110,7 @@
|
||||
"state": {
|
||||
"type": "outgoing-link",
|
||||
"state": {
|
||||
"file": "Informationssicherheit/Ueb4/Ueb4.md",
|
||||
"file": "Informationssicherheit/Ueb5/Ueb5.md",
|
||||
"linksCollapsed": false,
|
||||
"unlinkedCollapsed": true
|
||||
}
|
||||
@@ -133,7 +133,7 @@
|
||||
"state": {
|
||||
"type": "outline",
|
||||
"state": {
|
||||
"file": "Informationssicherheit/Ueb4/Ueb4.md"
|
||||
"file": "Informationssicherheit/Ueb5/Ueb5.md"
|
||||
}
|
||||
}
|
||||
},
|
||||
@@ -196,23 +196,24 @@
|
||||
},
|
||||
"active": "4759485602209736",
|
||||
"lastOpenFiles": [
|
||||
"Informationssicherheit/Ueb4/04-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/Ueb4/Ueb4.md",
|
||||
"Informationssicherheit/Ueb5/05-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/Ueb4/Ueb4 - Kopie.md",
|
||||
"Informationssicherheit/Ueb5/Ueb5.md",
|
||||
"Informationssicherheit/Ueb5",
|
||||
"Mathe/KW20/KW20.md",
|
||||
"Mathe/KW20/KW20-VekRau_vor.pdf",
|
||||
"Mathe/KW20/KW20-VekRau.pdf",
|
||||
"Mathe/KW20",
|
||||
"English/Matters Technik - IT Matters 3rd EditionB1B2 - Englisch Für IT-Berufe Schülerbuch (Isobel E. Williams) (Z-Library).pdf",
|
||||
"English/KW18.md",
|
||||
"Mathe/KW17/KW17.md",
|
||||
"Mathe/KW16/KW16-EWuuEV-sol.pdf",
|
||||
"Mathe/KW17/KW17-GeoTra-solutions.pdf",
|
||||
"Algorithmen und Datenstrukturen/VL/VL06/VL07.md",
|
||||
"Algorithmen und Datenstrukturen/VL/VL06",
|
||||
"Algorithmen und Datenstrukturen/VL",
|
||||
"Mathe/KW20/KW20-VekRau.pdf",
|
||||
"Mathe/KW20/KW20.md",
|
||||
"Informationssicherheit/Ueb5",
|
||||
"Informationssicherheit/Ueb4/04-ueb_uebungsblatt.pdf",
|
||||
"English/KW18.md",
|
||||
"Mathe/KW17/KW17.md",
|
||||
"Mathe/KW20.md",
|
||||
"Mathe/KW20/KW20-VekRau_vor.pdf",
|
||||
"Mathe/KW20",
|
||||
"Informationssicherheit/Ueb4/Ueb4.md",
|
||||
"Informationssicherheit/Ueb5/Ueb5.md",
|
||||
"Informationssicherheit/Ueb5/05-ueb_uebungsblatt.pdf",
|
||||
"Algorithmen und Datenstrukturen/UEB04/UEB4.md",
|
||||
"Informationssicherheit/Ueb3/Ueb3.md",
|
||||
"English/KW17.md",
|
||||
@@ -234,7 +235,6 @@
|
||||
"Untitled.md",
|
||||
"Excalidraw/Drawing 2023-04-17 08.21.36.excalidraw.md",
|
||||
"Excalidraw/Drawing 2023-04-17 08.21.00.excalidraw.md",
|
||||
"FH/Informationssicherheit/Ueb2/Ueb2.md",
|
||||
"Informationssicherheit/Ueb1/20230330_19h30m31s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230330_19h34m13s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_07h21m13s_grim.png",
|
||||
|
||||
Reference in New Issue
Block a user