vault backup: 2023-04-25 10:23:57

This commit is contained in:
2023-04-25 10:23:57 +02:00
parent 00e88bd1a2
commit 62657ef929
2 changed files with 583 additions and 54 deletions

View File

@@ -6,7 +6,7 @@
{
"id": "3cd0f756afc6dabe",
"type": "tabs",
"dimension": 36.69821240799159,
"dimension": 55.520504731861195,
"children": [
{
"id": "37f397ecb6b62143",
@@ -26,7 +26,7 @@
"state": {
"type": "markdown",
"state": {
"file": "Mathe/KW17/KW17.md",
"file": "CCN/Ex02/Exercise 2.md",
"mode": "source",
"source": false
}
@@ -38,60 +38,19 @@
{
"id": "47553fa673bb1eb6",
"type": "tabs",
"dimension": 63.30178759200841,
"dimension": 44.479495268138805,
"children": [
{
"id": "74c6cae00572ddcd",
"id": "bcaf3871b8b4e072",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "Algorithmen und Datenstrukturen/UEB03/VL03-Listen.pdf"
}
}
},
{
"id": "e375859f90230dd6",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "Algorithmen und Datenstrukturen/UEB03/UEB03.pdf"
}
}
},
{
"id": "c8c1cb50da7df13f",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "Mathe/KW16/KW16-EWuuEV.pdf"
}
}
},
{
"id": "d9833e44661ac9ad",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf"
}
}
},
{
"id": "6b635514e982264f",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "Mathe/KW17/KW17-GeoTra.pdf"
"file": "CCN/Ex02/ccn1-exercise2.pdf"
}
}
}
],
"currentTab": 4
]
}
],
"direction": "vertical"
@@ -157,7 +116,7 @@
"state": {
"type": "backlink",
"state": {
"file": "Mathe/KW17/KW17.md",
"file": "CCN/Ex02/ccn1-exercise2.pdf",
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical",
@@ -174,7 +133,7 @@
"state": {
"type": "outgoing-link",
"state": {
"file": "Mathe/KW17/KW17.md",
"file": "CCN/Ex02/ccn1-exercise2.pdf",
"linksCollapsed": false,
"unlinkedCollapsed": true
}
@@ -197,7 +156,7 @@
"state": {
"type": "outline",
"state": {
"file": "Mathe/KW17/KW17.md"
"file": "CCN/Ex02/ccn1-exercise2.pdf"
}
}
},
@@ -258,22 +217,21 @@
"obsidian-wordnet-plugin:WordNet Dictionary": false
}
},
"active": "ab8b2b633584c3c4",
"active": "bcaf3871b8b4e072",
"lastOpenFiles": [
"CCN/Ex02/Exercise 2.md",
"Mathe/KW17/KW17.md",
"Mathe/KW17/KW17-GeoTra.pdf",
"Algorithmen und Datenstrukturen/UEB03/UEB03.pdf",
"Mathe/KW16/KW16-EWuuEV.pdf",
"Mathe/KW17/KW17.md",
"Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf",
"Informationssicherheit/Ueb3/Ueb3.md",
"Informationssicherheit/VL/04-recht-standards-handout.pdf",
"Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf",
"CCN/Ex02/ccn1-exercise2.pdf",
"CCN/Ex02/Exercise 2.md",
"Informationssicherheit/Ueb3",
"CCN/Ex02",
"Mathe/KW17/KW17-GeoTra_vor.pdf",
"Mathe/KW17",
"Informationssicherheit/Ueb2/Ueb2.md",
"Algorithmen und Datenstrukturen/UEB03/UEB03.md",
"Mathe/KW16/UEB.md",