vault backup: 2023-04-25 10:23:57

This commit is contained in:
2023-04-25 10:23:57 +02:00
parent 00e88bd1a2
commit 62657ef929
2 changed files with 583 additions and 54 deletions

View File

@@ -342,6 +342,13 @@ PJa
Pth
PMp
PiX
Privacy
Prioritization
Power
Pda
PsY
PqdR
PHX
obj
oV
oYj
@@ -699,6 +706,17 @@ oFr
oUqn
odZc
oGz
over
organization
optimal
often
optic
optical
objectives
overall
optimize
obtained
oIL
Length
LCw
LN
@@ -1083,6 +1101,12 @@ LnH
LgN
LzjV
Lgk
Limitations
Lack
Line
Limited
Lower
LaX
Filter
FlateDecode
Ff
@@ -1465,6 +1489,11 @@ FfMT
Fle
FHx
FRRa
File
For
Fast
FvX
Fvg
stream
se
sH
@@ -1838,6 +1867,49 @@ ssb
syo
sDU
sBa
size
second
seconds
symbols
scale
solve
strength
summary
signals
security
slower
stable
significant
sensitive
services
suitable
series
sufficient
synchronize
schemes
synchronization
spectral
sequence
starting
scheme
special
simply
symbol
step
split
sending
some
steering
scalability
support
small
selectively
switches
store
service
scalable
sba
sMwr
ZKs
ZN
Zf
@@ -2213,6 +2285,9 @@ ZZW
Zsw
ZeZH
ZoD
Zero
Zka
ZGe
Who
We
WE
@@ -2612,6 +2687,8 @@ WCm
WsMH
WzQvD
WcP
Where
Without
KI
Kt
KF
@@ -2973,6 +3050,11 @@ KVaB
KLb
KOW
KgEZ
Kbit
KtK
Ket
Kqc
Kqr
bq
bQ
bG
@@ -3357,6 +3439,19 @@ bmH
bKD
bzs
bbN
byte
bandwidth
better
breaches
binary
both
back
before
bbV
bEU
beeSN
bTp
bNb
iZ
ig
iA
@@ -3750,6 +3845,35 @@ ixs
iqB
iYn
iRBZ
interferences
increase
increasing
improving
improve
infrastructure
include
interference
increased
interruptions
inconsistent
issues
involves
incorporating
its
internal
identify
individual
impact
important
incorporate
introduced
illustrated
intended
intercept
inefficient
improves
iuB
izU
GJe
GAG
GJ
@@ -4465,6 +4589,15 @@ AiA
Avzt
AkE
Azi
According
ADSL
Alternatively
Alternate
Access
ACLs
Available
AmYW
AHb
QV
Qom
QJ
@@ -4816,6 +4949,11 @@ QcSJtirJ
QGK
QuKh
QHUPHD
Quality
QoS
QDg
QsZ
QsL
nQC
nq
nR
@@ -5220,6 +5358,15 @@ ndr
nco
nlCe
nmB
need
noises
noise
needed
necessary
negative
needs
nIk
nTg
YJ
Yb
YwM
@@ -5589,6 +5736,9 @@ YFGQ
YuW
Yww
YQX
YCD
YpT
YGZ
UIQ
Ue
UH
@@ -5968,6 +6118,11 @@ Umvb
USMW
UYO
UktT
Unmanaged
Use
URz
Ujh
UTO
TZ
TF
TP
@@ -6334,6 +6489,15 @@ TRc
TWuDo
TGa
TQDD
Time
These
Troubleshooting
Therefore
Tja
THQ
TXy
TRA
TJT
gO
gHoVo
gD
@@ -6693,6 +6857,10 @@ gLR
gbN
guhM
gPdf
given
groups
group
gBy
DMg
Dv
DLg
@@ -7057,6 +7225,11 @@ DWm
DJc
DPl
DiG
Difficulty
Degradation
Density
Detection
Decoded
xU
xM
xK
@@ -7358,6 +7531,8 @@ xoY
xBM
xjS
xuG
xYd
xJt
Hx
HV
HdH
@@ -7692,6 +7867,13 @@ HKp
Hfm
Hrl
HRT
Hertz
Hartley
Hardware
Higher
Hubs
HLS
Hdbt
zo
zL
zE
@@ -8067,6 +8249,9 @@ zVk
zpKK
zgJ
zQqz
zero
zeros
zhy
hr
hAa
hH
@@ -8433,6 +8618,15 @@ hatE
hcbxw
hMTmS
hmSwn
higher
have
high
helps
help
hub
hosts
hubs
hZO
pt
ps
pao
@@ -8795,6 +8989,32 @@ pvx
prV
pNLB
pVv
per
plug
parameters
provider
possibilities
proper
problems
protect
privacy
prone
performance
provide
prioritization
priority
prolonged
periods
purpose
physical
power
positive
problem
packet
potential
potentially
prioritize
psE
Ic
IT
Ir
@@ -9150,6 +9370,13 @@ Inu
IMl
IBB
IOE
Increasing
Improving
Interference
Inverted
Increased
Inefficient
Improved
ap
aE
at
@@ -9523,6 +9750,40 @@ aeSJ
abww
aoo
aIy
approximately
available
achieve
already
achieved
advanced
amplification
around
allocation
accommodate
applications
allows
accurate
attenuation
assumed
algorithm
apply
assign
applying
all
amount
attackers
analyze
allocate
addressed
address
allowing
aBYU
aEF
aJC
aqEIj
amon
aUU
arXj
fb
fVVvD
fh
@@ -9930,6 +10191,24 @@ faF
fXV
ffSjz
fke
file
find
formula
factors
failover
frequent
facing
features
fiber
facilitate
follows
fixed
four
five
fact
followed
forward
forwards
Bs
ByJ
BF
@@ -10285,6 +10564,13 @@ Bao
BJqA
BLBt
Bty
Bandwidth
Bits
Because
Better
BsN
ByW
BQpD
ek
eP
eVPm
@@ -10740,6 +11026,27 @@ eKz
eUF
eDA
eBvU
explore
existing
either
ensure
experience
eavesdropping
electrical
electromagnetic
encoded
ensuring
easier
emissions
efficient
efficiency
example
encode
even
every
esju
eYY
esq
tj
tg
tt
@@ -11145,6 +11452,32 @@ tkat
tjh
ttU
tkM
time
transfer
takes
theorem
these
two
target
through
techniques
typically
transmitting
tampering
traffic
tools
troubleshooting
transforming
transmitted
timing
transmitter
table
they
transmit
three
them
theft
types
JFRO
JG
JL
@@ -11478,6 +11811,7 @@ JLcCQ
JzM
JYJ
JvMt
JLV
kXW
kW
kp
@@ -11810,6 +12144,10 @@ kfV
kkF
kgJQ
kOwR
kilobits
known
key
kaO
EU
Evq
Er
@@ -12194,6 +12532,16 @@ EQd
EBU
Emj
ECS
Error
Efficiency
EzT
EHe
Eik
ETvX
EpM
EbB
ERN
EXQ
lX
ll
lC
@@ -12552,6 +12900,23 @@ lXtI
lEh
lJK
lDb
linear
lack
lead
limitations
latency
leading
low
line
level
look
likelihood
lost
limited
lists
larger
lbf
lmo
wG
wd
ws
@@ -12903,6 +13268,15 @@ wsJ
wudhz
wVF
wVI
will
would
wire
wireless
within
while
whereas
wia
weq
RmZh
Rp
RJ
@@ -13315,6 +13689,17 @@ RwG
RiV
RDPF
RMbsb
Ratio
Rearrange
Reliability
Recovery
Return
Rates
Risks
Reduced
Rss
Rxb
RSL
vJ
vS
vKDF
@@ -13723,6 +14108,18 @@ vOOC
vsS
vXt
vpf
video
various
value
violations
voltage
valid
vZI
vxc
vYv
vTH
vLz
vpOGv
XE
Xd
XRb
@@ -14065,6 +14462,8 @@ XWz
Xjq
Xus
XKY
XDU
XXx
NW
Ni
Nj
@@ -14440,6 +14839,16 @@ NhTLX
NgCu
NLM
Nbl
Now
Nyquist
Number
Noise
NRZ
Non
NRZI
Note
Nvm
NAc
jhpK
jb
jl
@@ -14803,6 +15212,9 @@ jSiF
jVj
jBA
jII
jRj
jLyn
jhO
My
Mm
MO
@@ -15136,6 +15548,14 @@ MGN
MzP
MIh
MGMi
MHz
Mbps
Monitoring
Minimizing
MLT
Media
MUr
MdRR
qO
qj
qG
@@ -15439,6 +15859,9 @@ qKs
qzH
qkW
qRrt
quality
qpb
quq
yB
yyNs
yQU
@@ -15803,6 +16226,8 @@ yzu
ydN
yzy
ylm
yue
yLZ
ulC
uk
un
@@ -16179,6 +16604,13 @@ uwG
uTC
ufi
ugH
unit
using
use
unmanaged
unnecessary
utilization
unkN
ma
ml
mB
@@ -16545,6 +16977,24 @@ maEvv
mMC
mTV
mZA
megabytes
minutes
maximum
megabits
main
measures
more
mechanisms
means
monitoring
maintenance
making
minimize
minimizing
meeting
make
mug
mXK
dg
dw
de
@@ -16946,6 +17396,37 @@ dCA
dXL
dyHb
dgi
divide
determined
distinct
dimensionless
decibels
determine
desired
degradation
dropped
drops
difficult
devices
depend
diagnosing
downtime
digital
decoded
due
density
during
depending
decode
decoding
discarded
different
delays
degrade
designed
destination
dkN
dYSd
VV
VA
Vsm
@@ -17316,6 +17797,9 @@ VJi
VNkPm
Vwt
Vgi
VLANs
VmxV
VcI
SGN
Sg
SrEHO
@@ -17736,6 +18220,18 @@ SMmV
SPg
Snia
SlTWN
Shannon
SNR
Signal
Some
Stability
Scalability
Service
Synchronization
Spectral
Specifically
Since
Sending
rn
rE
rD
@@ -18127,6 +18623,36 @@ rCu
rOva
rVd
rzY
rate
ratio
rates
required
reducing
rearrange
refer
reduced
robust
result
resource
reliable
receive
reliability
resolving
received
receiver
recovery
reduce
regulatory
requirements
redundancy
represent
reverse
rule
require
resources
risks
reduces
rpa
Cu
CL
Ch
@@ -18469,6 +18995,13 @@ CPto
CCa
CPJ
Cyh
Channel
Congestion
Clock
Certain
Control
Correction
CBq
OM
OWR
Os
@@ -18788,6 +19321,8 @@ OHwG
OQY
OGg
Orn
OEj
Ouy
cgl
cj
content
@@ -19131,6 +19666,42 @@ cFA
cUh
ctS
calculate
convert
common
carrier
capacity
case
cables
correction
carriers
channels
corruption
connection
challenges
critical
challenging
costs
cable
clock
correct
codes
change
condition
coding
converts
character
combination
consecutive
converted
corrupted
consumed
caused
configured
cqT
cua
cpOy
cHVzXb
öUS
öG
öT

View File

@@ -6,7 +6,7 @@
{
"id": "3cd0f756afc6dabe",
"type": "tabs",
"dimension": 36.69821240799159,
"dimension": 55.520504731861195,
"children": [
{
"id": "37f397ecb6b62143",
@@ -26,7 +26,7 @@
"state": {
"type": "markdown",
"state": {
"file": "Mathe/KW17/KW17.md",
"file": "CCN/Ex02/Exercise 2.md",
"mode": "source",
"source": false
}
@@ -38,60 +38,19 @@
{
"id": "47553fa673bb1eb6",
"type": "tabs",
"dimension": 63.30178759200841,
"dimension": 44.479495268138805,
"children": [
{
"id": "74c6cae00572ddcd",
"id": "bcaf3871b8b4e072",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "Algorithmen und Datenstrukturen/UEB03/VL03-Listen.pdf"
}
}
},
{
"id": "e375859f90230dd6",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "Algorithmen und Datenstrukturen/UEB03/UEB03.pdf"
}
}
},
{
"id": "c8c1cb50da7df13f",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "Mathe/KW16/KW16-EWuuEV.pdf"
}
}
},
{
"id": "d9833e44661ac9ad",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf"
}
}
},
{
"id": "6b635514e982264f",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "Mathe/KW17/KW17-GeoTra.pdf"
"file": "CCN/Ex02/ccn1-exercise2.pdf"
}
}
}
],
"currentTab": 4
]
}
],
"direction": "vertical"
@@ -157,7 +116,7 @@
"state": {
"type": "backlink",
"state": {
"file": "Mathe/KW17/KW17.md",
"file": "CCN/Ex02/ccn1-exercise2.pdf",
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical",
@@ -174,7 +133,7 @@
"state": {
"type": "outgoing-link",
"state": {
"file": "Mathe/KW17/KW17.md",
"file": "CCN/Ex02/ccn1-exercise2.pdf",
"linksCollapsed": false,
"unlinkedCollapsed": true
}
@@ -197,7 +156,7 @@
"state": {
"type": "outline",
"state": {
"file": "Mathe/KW17/KW17.md"
"file": "CCN/Ex02/ccn1-exercise2.pdf"
}
}
},
@@ -258,22 +217,21 @@
"obsidian-wordnet-plugin:WordNet Dictionary": false
}
},
"active": "ab8b2b633584c3c4",
"active": "bcaf3871b8b4e072",
"lastOpenFiles": [
"CCN/Ex02/Exercise 2.md",
"Mathe/KW17/KW17.md",
"Mathe/KW17/KW17-GeoTra.pdf",
"Algorithmen und Datenstrukturen/UEB03/UEB03.pdf",
"Mathe/KW16/KW16-EWuuEV.pdf",
"Mathe/KW17/KW17.md",
"Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf",
"Informationssicherheit/Ueb3/Ueb3.md",
"Informationssicherheit/VL/04-recht-standards-handout.pdf",
"Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf",
"CCN/Ex02/ccn1-exercise2.pdf",
"CCN/Ex02/Exercise 2.md",
"Informationssicherheit/Ueb3",
"CCN/Ex02",
"Mathe/KW17/KW17-GeoTra_vor.pdf",
"Mathe/KW17",
"Informationssicherheit/Ueb2/Ueb2.md",
"Algorithmen und Datenstrukturen/UEB03/UEB03.md",
"Mathe/KW16/UEB.md",