vault backup: 2023-04-25 10:23:57

This commit is contained in:
2023-04-25 10:23:57 +02:00
parent 00e88bd1a2
commit 62657ef929
2 changed files with 583 additions and 54 deletions

View File

@@ -342,6 +342,13 @@ PJa
Pth Pth
PMp PMp
PiX PiX
Privacy
Prioritization
Power
Pda
PsY
PqdR
PHX
obj obj
oV oV
oYj oYj
@@ -699,6 +706,17 @@ oFr
oUqn oUqn
odZc odZc
oGz oGz
over
organization
optimal
often
optic
optical
objectives
overall
optimize
obtained
oIL
Length Length
LCw LCw
LN LN
@@ -1083,6 +1101,12 @@ LnH
LgN LgN
LzjV LzjV
Lgk Lgk
Limitations
Lack
Line
Limited
Lower
LaX
Filter Filter
FlateDecode FlateDecode
Ff Ff
@@ -1465,6 +1489,11 @@ FfMT
Fle Fle
FHx FHx
FRRa FRRa
File
For
Fast
FvX
Fvg
stream stream
se se
sH sH
@@ -1838,6 +1867,49 @@ ssb
syo syo
sDU sDU
sBa sBa
size
second
seconds
symbols
scale
solve
strength
summary
signals
security
slower
stable
significant
sensitive
services
suitable
series
sufficient
synchronize
schemes
synchronization
spectral
sequence
starting
scheme
special
simply
symbol
step
split
sending
some
steering
scalability
support
small
selectively
switches
store
service
scalable
sba
sMwr
ZKs ZKs
ZN ZN
Zf Zf
@@ -2213,6 +2285,9 @@ ZZW
Zsw Zsw
ZeZH ZeZH
ZoD ZoD
Zero
Zka
ZGe
Who Who
We We
WE WE
@@ -2612,6 +2687,8 @@ WCm
WsMH WsMH
WzQvD WzQvD
WcP WcP
Where
Without
KI KI
Kt Kt
KF KF
@@ -2973,6 +3050,11 @@ KVaB
KLb KLb
KOW KOW
KgEZ KgEZ
Kbit
KtK
Ket
Kqc
Kqr
bq bq
bQ bQ
bG bG
@@ -3357,6 +3439,19 @@ bmH
bKD bKD
bzs bzs
bbN bbN
byte
bandwidth
better
breaches
binary
both
back
before
bbV
bEU
beeSN
bTp
bNb
iZ iZ
ig ig
iA iA
@@ -3750,6 +3845,35 @@ ixs
iqB iqB
iYn iYn
iRBZ iRBZ
interferences
increase
increasing
improving
improve
infrastructure
include
interference
increased
interruptions
inconsistent
issues
involves
incorporating
its
internal
identify
individual
impact
important
incorporate
introduced
illustrated
intended
intercept
inefficient
improves
iuB
izU
GJe GJe
GAG GAG
GJ GJ
@@ -4465,6 +4589,15 @@ AiA
Avzt Avzt
AkE AkE
Azi Azi
According
ADSL
Alternatively
Alternate
Access
ACLs
Available
AmYW
AHb
QV QV
Qom Qom
QJ QJ
@@ -4816,6 +4949,11 @@ QcSJtirJ
QGK QGK
QuKh QuKh
QHUPHD QHUPHD
Quality
QoS
QDg
QsZ
QsL
nQC nQC
nq nq
nR nR
@@ -5220,6 +5358,15 @@ ndr
nco nco
nlCe nlCe
nmB nmB
need
noises
noise
needed
necessary
negative
needs
nIk
nTg
YJ YJ
Yb Yb
YwM YwM
@@ -5589,6 +5736,9 @@ YFGQ
YuW YuW
Yww Yww
YQX YQX
YCD
YpT
YGZ
UIQ UIQ
Ue Ue
UH UH
@@ -5968,6 +6118,11 @@ Umvb
USMW USMW
UYO UYO
UktT UktT
Unmanaged
Use
URz
Ujh
UTO
TZ TZ
TF TF
TP TP
@@ -6334,6 +6489,15 @@ TRc
TWuDo TWuDo
TGa TGa
TQDD TQDD
Time
These
Troubleshooting
Therefore
Tja
THQ
TXy
TRA
TJT
gO gO
gHoVo gHoVo
gD gD
@@ -6693,6 +6857,10 @@ gLR
gbN gbN
guhM guhM
gPdf gPdf
given
groups
group
gBy
DMg DMg
Dv Dv
DLg DLg
@@ -7057,6 +7225,11 @@ DWm
DJc DJc
DPl DPl
DiG DiG
Difficulty
Degradation
Density
Detection
Decoded
xU xU
xM xM
xK xK
@@ -7358,6 +7531,8 @@ xoY
xBM xBM
xjS xjS
xuG xuG
xYd
xJt
Hx Hx
HV HV
HdH HdH
@@ -7692,6 +7867,13 @@ HKp
Hfm Hfm
Hrl Hrl
HRT HRT
Hertz
Hartley
Hardware
Higher
Hubs
HLS
Hdbt
zo zo
zL zL
zE zE
@@ -8067,6 +8249,9 @@ zVk
zpKK zpKK
zgJ zgJ
zQqz zQqz
zero
zeros
zhy
hr hr
hAa hAa
hH hH
@@ -8433,6 +8618,15 @@ hatE
hcbxw hcbxw
hMTmS hMTmS
hmSwn hmSwn
higher
have
high
helps
help
hub
hosts
hubs
hZO
pt pt
ps ps
pao pao
@@ -8795,6 +8989,32 @@ pvx
prV prV
pNLB pNLB
pVv pVv
per
plug
parameters
provider
possibilities
proper
problems
protect
privacy
prone
performance
provide
prioritization
priority
prolonged
periods
purpose
physical
power
positive
problem
packet
potential
potentially
prioritize
psE
Ic Ic
IT IT
Ir Ir
@@ -9150,6 +9370,13 @@ Inu
IMl IMl
IBB IBB
IOE IOE
Increasing
Improving
Interference
Inverted
Increased
Inefficient
Improved
ap ap
aE aE
at at
@@ -9523,6 +9750,40 @@ aeSJ
abww abww
aoo aoo
aIy aIy
approximately
available
achieve
already
achieved
advanced
amplification
around
allocation
accommodate
applications
allows
accurate
attenuation
assumed
algorithm
apply
assign
applying
all
amount
attackers
analyze
allocate
addressed
address
allowing
aBYU
aEF
aJC
aqEIj
amon
aUU
arXj
fb fb
fVVvD fVVvD
fh fh
@@ -9930,6 +10191,24 @@ faF
fXV fXV
ffSjz ffSjz
fke fke
file
find
formula
factors
failover
frequent
facing
features
fiber
facilitate
follows
fixed
four
five
fact
followed
forward
forwards
Bs Bs
ByJ ByJ
BF BF
@@ -10285,6 +10564,13 @@ Bao
BJqA BJqA
BLBt BLBt
Bty Bty
Bandwidth
Bits
Because
Better
BsN
ByW
BQpD
ek ek
eP eP
eVPm eVPm
@@ -10740,6 +11026,27 @@ eKz
eUF eUF
eDA eDA
eBvU eBvU
explore
existing
either
ensure
experience
eavesdropping
electrical
electromagnetic
encoded
ensuring
easier
emissions
efficient
efficiency
example
encode
even
every
esju
eYY
esq
tj tj
tg tg
tt tt
@@ -11145,6 +11452,32 @@ tkat
tjh tjh
ttU ttU
tkM tkM
time
transfer
takes
theorem
these
two
target
through
techniques
typically
transmitting
tampering
traffic
tools
troubleshooting
transforming
transmitted
timing
transmitter
table
they
transmit
three
them
theft
types
JFRO JFRO
JG JG
JL JL
@@ -11478,6 +11811,7 @@ JLcCQ
JzM JzM
JYJ JYJ
JvMt JvMt
JLV
kXW kXW
kW kW
kp kp
@@ -11810,6 +12144,10 @@ kfV
kkF kkF
kgJQ kgJQ
kOwR kOwR
kilobits
known
key
kaO
EU EU
Evq Evq
Er Er
@@ -12194,6 +12532,16 @@ EQd
EBU EBU
Emj Emj
ECS ECS
Error
Efficiency
EzT
EHe
Eik
ETvX
EpM
EbB
ERN
EXQ
lX lX
ll ll
lC lC
@@ -12552,6 +12900,23 @@ lXtI
lEh lEh
lJK lJK
lDb lDb
linear
lack
lead
limitations
latency
leading
low
line
level
look
likelihood
lost
limited
lists
larger
lbf
lmo
wG wG
wd wd
ws ws
@@ -12903,6 +13268,15 @@ wsJ
wudhz wudhz
wVF wVF
wVI wVI
will
would
wire
wireless
within
while
whereas
wia
weq
RmZh RmZh
Rp Rp
RJ RJ
@@ -13315,6 +13689,17 @@ RwG
RiV RiV
RDPF RDPF
RMbsb RMbsb
Ratio
Rearrange
Reliability
Recovery
Return
Rates
Risks
Reduced
Rss
Rxb
RSL
vJ vJ
vS vS
vKDF vKDF
@@ -13723,6 +14108,18 @@ vOOC
vsS vsS
vXt vXt
vpf vpf
video
various
value
violations
voltage
valid
vZI
vxc
vYv
vTH
vLz
vpOGv
XE XE
Xd Xd
XRb XRb
@@ -14065,6 +14462,8 @@ XWz
Xjq Xjq
Xus Xus
XKY XKY
XDU
XXx
NW NW
Ni Ni
Nj Nj
@@ -14440,6 +14839,16 @@ NhTLX
NgCu NgCu
NLM NLM
Nbl Nbl
Now
Nyquist
Number
Noise
NRZ
Non
NRZI
Note
Nvm
NAc
jhpK jhpK
jb jb
jl jl
@@ -14803,6 +15212,9 @@ jSiF
jVj jVj
jBA jBA
jII jII
jRj
jLyn
jhO
My My
Mm Mm
MO MO
@@ -15136,6 +15548,14 @@ MGN
MzP MzP
MIh MIh
MGMi MGMi
MHz
Mbps
Monitoring
Minimizing
MLT
Media
MUr
MdRR
qO qO
qj qj
qG qG
@@ -15439,6 +15859,9 @@ qKs
qzH qzH
qkW qkW
qRrt qRrt
quality
qpb
quq
yB yB
yyNs yyNs
yQU yQU
@@ -15803,6 +16226,8 @@ yzu
ydN ydN
yzy yzy
ylm ylm
yue
yLZ
ulC ulC
uk uk
un un
@@ -16179,6 +16604,13 @@ uwG
uTC uTC
ufi ufi
ugH ugH
unit
using
use
unmanaged
unnecessary
utilization
unkN
ma ma
ml ml
mB mB
@@ -16545,6 +16977,24 @@ maEvv
mMC mMC
mTV mTV
mZA mZA
megabytes
minutes
maximum
megabits
main
measures
more
mechanisms
means
monitoring
maintenance
making
minimize
minimizing
meeting
make
mug
mXK
dg dg
dw dw
de de
@@ -16946,6 +17396,37 @@ dCA
dXL dXL
dyHb dyHb
dgi dgi
divide
determined
distinct
dimensionless
decibels
determine
desired
degradation
dropped
drops
difficult
devices
depend
diagnosing
downtime
digital
decoded
due
density
during
depending
decode
decoding
discarded
different
delays
degrade
designed
destination
dkN
dYSd
VV VV
VA VA
Vsm Vsm
@@ -17316,6 +17797,9 @@ VJi
VNkPm VNkPm
Vwt Vwt
Vgi Vgi
VLANs
VmxV
VcI
SGN SGN
Sg Sg
SrEHO SrEHO
@@ -17736,6 +18220,18 @@ SMmV
SPg SPg
Snia Snia
SlTWN SlTWN
Shannon
SNR
Signal
Some
Stability
Scalability
Service
Synchronization
Spectral
Specifically
Since
Sending
rn rn
rE rE
rD rD
@@ -18127,6 +18623,36 @@ rCu
rOva rOva
rVd rVd
rzY rzY
rate
ratio
rates
required
reducing
rearrange
refer
reduced
robust
result
resource
reliable
receive
reliability
resolving
received
receiver
recovery
reduce
regulatory
requirements
redundancy
represent
reverse
rule
require
resources
risks
reduces
rpa
Cu Cu
CL CL
Ch Ch
@@ -18469,6 +18995,13 @@ CPto
CCa CCa
CPJ CPJ
Cyh Cyh
Channel
Congestion
Clock
Certain
Control
Correction
CBq
OM OM
OWR OWR
Os Os
@@ -18788,6 +19321,8 @@ OHwG
OQY OQY
OGg OGg
Orn Orn
OEj
Ouy
cgl cgl
cj cj
content content
@@ -19131,6 +19666,42 @@ cFA
cUh cUh
ctS ctS
calculate
convert
common
carrier
capacity
case
cables
correction
carriers
channels
corruption
connection
challenges
critical
challenging
costs
cable
clock
correct
codes
change
condition
coding
converts
character
combination
consecutive
converted
corrupted
consumed
caused
configured
cqT
cua
cpOy
cHVzXb
öUS öUS
öG öG
öT öT

View File

@@ -6,7 +6,7 @@
{ {
"id": "3cd0f756afc6dabe", "id": "3cd0f756afc6dabe",
"type": "tabs", "type": "tabs",
"dimension": 36.69821240799159, "dimension": 55.520504731861195,
"children": [ "children": [
{ {
"id": "37f397ecb6b62143", "id": "37f397ecb6b62143",
@@ -26,7 +26,7 @@
"state": { "state": {
"type": "markdown", "type": "markdown",
"state": { "state": {
"file": "Mathe/KW17/KW17.md", "file": "CCN/Ex02/Exercise 2.md",
"mode": "source", "mode": "source",
"source": false "source": false
} }
@@ -38,60 +38,19 @@
{ {
"id": "47553fa673bb1eb6", "id": "47553fa673bb1eb6",
"type": "tabs", "type": "tabs",
"dimension": 63.30178759200841, "dimension": 44.479495268138805,
"children": [ "children": [
{ {
"id": "74c6cae00572ddcd", "id": "bcaf3871b8b4e072",
"type": "leaf", "type": "leaf",
"state": { "state": {
"type": "pdf", "type": "pdf",
"state": { "state": {
"file": "Algorithmen und Datenstrukturen/UEB03/VL03-Listen.pdf" "file": "CCN/Ex02/ccn1-exercise2.pdf"
}
}
},
{
"id": "e375859f90230dd6",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "Algorithmen und Datenstrukturen/UEB03/UEB03.pdf"
}
}
},
{
"id": "c8c1cb50da7df13f",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "Mathe/KW16/KW16-EWuuEV.pdf"
}
}
},
{
"id": "d9833e44661ac9ad",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf"
}
}
},
{
"id": "6b635514e982264f",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "Mathe/KW17/KW17-GeoTra.pdf"
} }
} }
} }
], ]
"currentTab": 4
} }
], ],
"direction": "vertical" "direction": "vertical"
@@ -157,7 +116,7 @@
"state": { "state": {
"type": "backlink", "type": "backlink",
"state": { "state": {
"file": "Mathe/KW17/KW17.md", "file": "CCN/Ex02/ccn1-exercise2.pdf",
"collapseAll": false, "collapseAll": false,
"extraContext": false, "extraContext": false,
"sortOrder": "alphabetical", "sortOrder": "alphabetical",
@@ -174,7 +133,7 @@
"state": { "state": {
"type": "outgoing-link", "type": "outgoing-link",
"state": { "state": {
"file": "Mathe/KW17/KW17.md", "file": "CCN/Ex02/ccn1-exercise2.pdf",
"linksCollapsed": false, "linksCollapsed": false,
"unlinkedCollapsed": true "unlinkedCollapsed": true
} }
@@ -197,7 +156,7 @@
"state": { "state": {
"type": "outline", "type": "outline",
"state": { "state": {
"file": "Mathe/KW17/KW17.md" "file": "CCN/Ex02/ccn1-exercise2.pdf"
} }
} }
}, },
@@ -258,22 +217,21 @@
"obsidian-wordnet-plugin:WordNet Dictionary": false "obsidian-wordnet-plugin:WordNet Dictionary": false
} }
}, },
"active": "ab8b2b633584c3c4", "active": "bcaf3871b8b4e072",
"lastOpenFiles": [ "lastOpenFiles": [
"CCN/Ex02/Exercise 2.md",
"Mathe/KW17/KW17.md",
"Mathe/KW17/KW17-GeoTra.pdf", "Mathe/KW17/KW17-GeoTra.pdf",
"Algorithmen und Datenstrukturen/UEB03/UEB03.pdf", "Algorithmen und Datenstrukturen/UEB03/UEB03.pdf",
"Mathe/KW16/KW16-EWuuEV.pdf", "Mathe/KW16/KW16-EWuuEV.pdf",
"Mathe/KW17/KW17.md",
"Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf", "Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf",
"Informationssicherheit/Ueb3/Ueb3.md", "Informationssicherheit/Ueb3/Ueb3.md",
"Informationssicherheit/VL/04-recht-standards-handout.pdf", "Informationssicherheit/VL/04-recht-standards-handout.pdf",
"Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf", "Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf",
"CCN/Ex02/ccn1-exercise2.pdf", "CCN/Ex02/ccn1-exercise2.pdf",
"CCN/Ex02/Exercise 2.md",
"Informationssicherheit/Ueb3", "Informationssicherheit/Ueb3",
"CCN/Ex02", "CCN/Ex02",
"Mathe/KW17/KW17-GeoTra_vor.pdf", "Mathe/KW17/KW17-GeoTra_vor.pdf",
"Mathe/KW17",
"Informationssicherheit/Ueb2/Ueb2.md", "Informationssicherheit/Ueb2/Ueb2.md",
"Algorithmen und Datenstrukturen/UEB03/UEB03.md", "Algorithmen und Datenstrukturen/UEB03/UEB03.md",
"Mathe/KW16/UEB.md", "Mathe/KW16/UEB.md",