From 62657ef9297ca59820bce088df8d643024be808f Mon Sep 17 00:00:00 2001 From: Jordi Date: Tue, 25 Apr 2023 10:23:57 +0200 Subject: [PATCH] vault backup: 2023-04-25 10:23:57 --- .../obsidian-completr/scanned_words.txt | 571 ++++++++++++++++++ .obsidian/workspace.json | 66 +- 2 files changed, 583 insertions(+), 54 deletions(-) diff --git a/.obsidian/plugins/obsidian-completr/scanned_words.txt b/.obsidian/plugins/obsidian-completr/scanned_words.txt index 54b14e4..ce82987 100644 --- a/.obsidian/plugins/obsidian-completr/scanned_words.txt +++ b/.obsidian/plugins/obsidian-completr/scanned_words.txt @@ -342,6 +342,13 @@ PJa Pth PMp PiX +Privacy +Prioritization +Power +Pda +PsY +PqdR +PHX obj oV oYj @@ -699,6 +706,17 @@ oFr oUqn odZc oGz +over +organization +optimal +often +optic +optical +objectives +overall +optimize +obtained +oIL Length LCw LN @@ -1083,6 +1101,12 @@ LnH LgN LzjV Lgk +Limitations +Lack +Line +Limited +Lower +LaX Filter FlateDecode Ff @@ -1465,6 +1489,11 @@ FfMT Fle FHx FRRa +File +For +Fast +FvX +Fvg stream se sH @@ -1838,6 +1867,49 @@ ssb syo sDU sBa +size +second +seconds +symbols +scale +solve +strength +summary +signals +security +slower +stable +significant +sensitive +services +suitable +series +sufficient +synchronize +schemes +synchronization +spectral +sequence +starting +scheme +special +simply +symbol +step +split +sending +some +steering +scalability +support +small +selectively +switches +store +service +scalable +sba +sMwr ZKs ZN Zf @@ -2213,6 +2285,9 @@ ZZW Zsw ZeZH ZoD +Zero +Zka +ZGe Who We WE @@ -2612,6 +2687,8 @@ WCm WsMH WzQvD WcP +Where +Without KI Kt KF @@ -2973,6 +3050,11 @@ KVaB KLb KOW KgEZ +Kbit +KtK +Ket +Kqc +Kqr bq bQ bG @@ -3357,6 +3439,19 @@ bmH bKD bzs bbN +byte +bandwidth +better +breaches +binary +both +back +before +bbV +bEU +beeSN +bTp +bNb iZ ig iA @@ -3750,6 +3845,35 @@ ixs iqB iYn iRBZ +interferences +increase +increasing +improving +improve +infrastructure +include +interference +increased +interruptions +inconsistent +issues +involves +incorporating +its +internal +identify +individual +impact +important +incorporate +introduced +illustrated +intended +intercept +inefficient +improves +iuB +izU GJe GAG GJ @@ -4465,6 +4589,15 @@ AiA Avzt AkE Azi +According +ADSL +Alternatively +Alternate +Access +ACLs +Available +AmYW +AHb QV Qom QJ @@ -4816,6 +4949,11 @@ QcSJtirJ QGK QuKh QHUPHD +Quality +QoS +QDg +QsZ +QsL nQC nq nR @@ -5220,6 +5358,15 @@ ndr nco nlCe nmB +need +noises +noise +needed +necessary +negative +needs +nIk +nTg YJ Yb YwM @@ -5589,6 +5736,9 @@ YFGQ YuW Yww YQX +YCD +YpT +YGZ UIQ Ue UH @@ -5968,6 +6118,11 @@ Umvb USMW UYO UktT +Unmanaged +Use +URz +Ujh +UTO TZ TF TP @@ -6334,6 +6489,15 @@ TRc TWuDo TGa TQDD +Time +These +Troubleshooting +Therefore +Tja +THQ +TXy +TRA +TJT gO gHoVo gD @@ -6693,6 +6857,10 @@ gLR gbN guhM gPdf +given +groups +group +gBy DMg Dv DLg @@ -7057,6 +7225,11 @@ DWm DJc DPl DiG +Difficulty +Degradation +Density +Detection +Decoded xU xM xK @@ -7358,6 +7531,8 @@ xoY xBM xjS xuG +xYd +xJt Hx HV HdH @@ -7692,6 +7867,13 @@ HKp Hfm Hrl HRT +Hertz +Hartley +Hardware +Higher +Hubs +HLS +Hdbt zo zL zE @@ -8067,6 +8249,9 @@ zVk zpKK zgJ zQqz +zero +zeros +zhy hr hAa hH @@ -8433,6 +8618,15 @@ hatE hcbxw hMTmS hmSwn +higher +have +high +helps +help +hub +hosts +hubs +hZO pt ps pao @@ -8795,6 +8989,32 @@ pvx prV pNLB pVv +per +plug +parameters +provider +possibilities +proper +problems +protect +privacy +prone +performance +provide +prioritization +priority +prolonged +periods +purpose +physical +power +positive +problem +packet +potential +potentially +prioritize +psE Ic IT Ir @@ -9150,6 +9370,13 @@ Inu IMl IBB IOE +Increasing +Improving +Interference +Inverted +Increased +Inefficient +Improved ap aE at @@ -9523,6 +9750,40 @@ aeSJ abww aoo aIy +approximately +available +achieve +already +achieved +advanced +amplification +around +allocation +accommodate +applications +allows +accurate +attenuation +assumed +algorithm +apply +assign +applying +all +amount +attackers +analyze +allocate +addressed +address +allowing +aBYU +aEF +aJC +aqEIj +amon +aUU +arXj fb fVVvD fh @@ -9930,6 +10191,24 @@ faF fXV ffSjz fke +file +find +formula +factors +failover +frequent +facing +features +fiber +facilitate +follows +fixed +four +five +fact +followed +forward +forwards Bs ByJ BF @@ -10285,6 +10564,13 @@ Bao BJqA BLBt Bty +Bandwidth +Bits +Because +Better +BsN +ByW +BQpD ek eP eVPm @@ -10740,6 +11026,27 @@ eKz eUF eDA eBvU +explore +existing +either +ensure +experience +eavesdropping +electrical +electromagnetic +encoded +ensuring +easier +emissions +efficient +efficiency +example +encode +even +every +esju +eYY +esq tj tg tt @@ -11145,6 +11452,32 @@ tkat tjh ttU tkM +time +transfer +takes +theorem +these +two +target +through +techniques +typically +transmitting +tampering +traffic +tools +troubleshooting +transforming +transmitted +timing +transmitter +table +they +transmit +three +them +theft +types JFRO JG JL @@ -11478,6 +11811,7 @@ JLcCQ JzM JYJ JvMt +JLV kXW kW kp @@ -11810,6 +12144,10 @@ kfV kkF kgJQ kOwR +kilobits +known +key +kaO EU Evq Er @@ -12194,6 +12532,16 @@ EQd EBU Emj ECS +Error +Efficiency +EzT +EHe +Eik +ETvX +EpM +EbB +ERN +EXQ lX ll lC @@ -12552,6 +12900,23 @@ lXtI lEh lJK lDb +linear +lack +lead +limitations +latency +leading +low +line +level +look +likelihood +lost +limited +lists +larger +lbf +lmo wG wd ws @@ -12903,6 +13268,15 @@ wsJ wudhz wVF wVI +will +would +wire +wireless +within +while +whereas +wia +weq RmZh Rp RJ @@ -13315,6 +13689,17 @@ RwG RiV RDPF RMbsb +Ratio +Rearrange +Reliability +Recovery +Return +Rates +Risks +Reduced +Rss +Rxb +RSL vJ vS vKDF @@ -13723,6 +14108,18 @@ vOOC vsS vXt vpf +video +various +value +violations +voltage +valid +vZI +vxc +vYv +vTH +vLz +vpOGv XE Xd XRb @@ -14065,6 +14462,8 @@ XWz Xjq Xus XKY +XDU +XXx NW Ni Nj @@ -14440,6 +14839,16 @@ NhTLX NgCu NLM Nbl +Now +Nyquist +Number +Noise +NRZ +Non +NRZI +Note +Nvm +NAc jhpK jb jl @@ -14803,6 +15212,9 @@ jSiF jVj jBA jII +jRj +jLyn +jhO My Mm MO @@ -15136,6 +15548,14 @@ MGN MzP MIh MGMi +MHz +Mbps +Monitoring +Minimizing +MLT +Media +MUr +MdRR qO qj qG @@ -15439,6 +15859,9 @@ qKs qzH qkW qRrt +quality +qpb +quq yB yyNs yQU @@ -15803,6 +16226,8 @@ yzu ydN yzy ylm +yue +yLZ ulC uk un @@ -16179,6 +16604,13 @@ uwG uTC ufi ugH +unit +using +use +unmanaged +unnecessary +utilization +unkN ma ml mB @@ -16545,6 +16977,24 @@ maEvv mMC mTV mZA +megabytes +minutes +maximum +megabits +main +measures +more +mechanisms +means +monitoring +maintenance +making +minimize +minimizing +meeting +make +mug +mXK dg dw de @@ -16946,6 +17396,37 @@ dCA dXL dyHb dgi +divide +determined +distinct +dimensionless +decibels +determine +desired +degradation +dropped +drops +difficult +devices +depend +diagnosing +downtime +digital +decoded +due +density +during +depending +decode +decoding +discarded +different +delays +degrade +designed +destination +dkN +dYSd VV VA Vsm @@ -17316,6 +17797,9 @@ VJi VNkPm Vwt Vgi +VLANs +VmxV +VcI SGN Sg SrEHO @@ -17736,6 +18220,18 @@ SMmV SPg Snia SlTWN +Shannon +SNR +Signal +Some +Stability +Scalability +Service +Synchronization +Spectral +Specifically +Since +Sending rn rE rD @@ -18127,6 +18623,36 @@ rCu rOva rVd rzY +rate +ratio +rates +required +reducing +rearrange +refer +reduced +robust +result +resource +reliable +receive +reliability +resolving +received +receiver +recovery +reduce +regulatory +requirements +redundancy +represent +reverse +rule +require +resources +risks +reduces +rpa Cu CL Ch @@ -18469,6 +18995,13 @@ CPto CCa CPJ Cyh +Channel +Congestion +Clock +Certain +Control +Correction +CBq OM OWR Os @@ -18788,6 +19321,8 @@ OHwG OQY OGg Orn +OEj +Ouy cgl cj content @@ -19131,6 +19666,42 @@ cFA cÄ cUh ctS +calculate +convert +common +carrier +capacity +case +cables +correction +carriers +channels +corruption +connection +challenges +critical +challenging +costs +cable +clock +correct +codes +change +condition +coding +converts +character +combination +consecutive +converted +corrupted +consumed +caused +configured +cqT +cua +cpOy +cHVzXb öUS öG öT diff --git a/.obsidian/workspace.json b/.obsidian/workspace.json index 80062c1..bd0497c 100644 --- a/.obsidian/workspace.json +++ b/.obsidian/workspace.json @@ -6,7 +6,7 @@ { "id": "3cd0f756afc6dabe", "type": "tabs", - "dimension": 36.69821240799159, + "dimension": 55.520504731861195, "children": [ { "id": "37f397ecb6b62143", @@ -26,7 +26,7 @@ "state": { "type": "markdown", "state": { - "file": "Mathe/KW17/KW17.md", + "file": "CCN/Ex02/Exercise 2.md", "mode": "source", "source": false } @@ -38,60 +38,19 @@ { "id": "47553fa673bb1eb6", "type": "tabs", - "dimension": 63.30178759200841, + "dimension": 44.479495268138805, "children": [ { - "id": "74c6cae00572ddcd", + "id": "bcaf3871b8b4e072", "type": "leaf", "state": { "type": "pdf", "state": { - "file": "Algorithmen und Datenstrukturen/UEB03/VL03-Listen.pdf" - } - } - }, - { - "id": "e375859f90230dd6", - "type": "leaf", - "state": { - "type": "pdf", - "state": { - "file": "Algorithmen und Datenstrukturen/UEB03/UEB03.pdf" - } - } - }, - { - "id": "c8c1cb50da7df13f", - "type": "leaf", - "state": { - "type": "pdf", - "state": { - "file": "Mathe/KW16/KW16-EWuuEV.pdf" - } - } - }, - { - "id": "d9833e44661ac9ad", - "type": "leaf", - "state": { - "type": "pdf", - "state": { - "file": "Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf" - } - } - }, - { - "id": "6b635514e982264f", - "type": "leaf", - "state": { - "type": "pdf", - "state": { - "file": "Mathe/KW17/KW17-GeoTra.pdf" + "file": "CCN/Ex02/ccn1-exercise2.pdf" } } } - ], - "currentTab": 4 + ] } ], "direction": "vertical" @@ -157,7 +116,7 @@ "state": { "type": "backlink", "state": { - "file": "Mathe/KW17/KW17.md", + "file": "CCN/Ex02/ccn1-exercise2.pdf", "collapseAll": false, "extraContext": false, "sortOrder": "alphabetical", @@ -174,7 +133,7 @@ "state": { "type": "outgoing-link", "state": { - "file": "Mathe/KW17/KW17.md", + "file": "CCN/Ex02/ccn1-exercise2.pdf", "linksCollapsed": false, "unlinkedCollapsed": true } @@ -197,7 +156,7 @@ "state": { "type": "outline", "state": { - "file": "Mathe/KW17/KW17.md" + "file": "CCN/Ex02/ccn1-exercise2.pdf" } } }, @@ -258,22 +217,21 @@ "obsidian-wordnet-plugin:WordNet Dictionary": false } }, - "active": "ab8b2b633584c3c4", + "active": "bcaf3871b8b4e072", "lastOpenFiles": [ + "CCN/Ex02/Exercise 2.md", + "Mathe/KW17/KW17.md", "Mathe/KW17/KW17-GeoTra.pdf", "Algorithmen und Datenstrukturen/UEB03/UEB03.pdf", "Mathe/KW16/KW16-EWuuEV.pdf", - "Mathe/KW17/KW17.md", "Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf", "Informationssicherheit/Ueb3/Ueb3.md", "Informationssicherheit/VL/04-recht-standards-handout.pdf", "Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf", "CCN/Ex02/ccn1-exercise2.pdf", - "CCN/Ex02/Exercise 2.md", "Informationssicherheit/Ueb3", "CCN/Ex02", "Mathe/KW17/KW17-GeoTra_vor.pdf", - "Mathe/KW17", "Informationssicherheit/Ueb2/Ueb2.md", "Algorithmen und Datenstrukturen/UEB03/UEB03.md", "Mathe/KW16/UEB.md",