vault backup: 2023-06-28 14:13:22
This commit is contained in:
20
.obsidian/workspace.json
vendored
20
.obsidian/workspace.json
vendored
@@ -47,11 +47,9 @@
|
||||
"id": "f9cf9fea491fdc42",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "markdown",
|
||||
"type": "pdf",
|
||||
"state": {
|
||||
"file": "English/KW26.md",
|
||||
"mode": "source",
|
||||
"source": false
|
||||
"file": "Informationssicherheit/Ueb9/UEB_09.pdf"
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -130,7 +128,7 @@
|
||||
"state": {
|
||||
"type": "backlink",
|
||||
"state": {
|
||||
"file": "English/KW26.md",
|
||||
"file": "Informationssicherheit/Ueb9/UEB_09.pdf",
|
||||
"collapseAll": false,
|
||||
"extraContext": false,
|
||||
"sortOrder": "alphabetical",
|
||||
@@ -147,7 +145,7 @@
|
||||
"state": {
|
||||
"type": "outgoing-link",
|
||||
"state": {
|
||||
"file": "English/KW26.md",
|
||||
"file": "Informationssicherheit/Ueb9/UEB_09.pdf",
|
||||
"linksCollapsed": false,
|
||||
"unlinkedCollapsed": true
|
||||
}
|
||||
@@ -170,7 +168,7 @@
|
||||
"state": {
|
||||
"type": "outline",
|
||||
"state": {
|
||||
"file": "English/KW26.md"
|
||||
"file": "Informationssicherheit/Ueb9/UEB_09.pdf"
|
||||
}
|
||||
}
|
||||
},
|
||||
@@ -233,10 +231,12 @@
|
||||
},
|
||||
"active": "f9cf9fea491fdc42",
|
||||
"lastOpenFiles": [
|
||||
"English/Matters Technik - IT Matters 3rd EditionB1B2 - Englisch Für IT-Berufe Schülerbuch (Isobel E. Williams) (Z-Library).pdf",
|
||||
"English/KW26.md",
|
||||
"Informationssicherheit/Ueb9/UEB_09.md",
|
||||
"Informationssicherheit/Ueb9/UEB 09.pdf",
|
||||
"Informationssicherheit/Ueb9/UEB_09.pdf",
|
||||
"Informationssicherheit/Ueb9/UEB 09.md",
|
||||
"English/KW26.md",
|
||||
"English/Matters Technik - IT Matters 3rd EditionB1B2 - Englisch Für IT-Berufe Schülerbuch (Isobel E. Williams) (Z-Library).pdf",
|
||||
"Informationssicherheit/Ueb9",
|
||||
"Informationssicherheit/Ueb6/white1-4015396961.webp",
|
||||
"Informationssicherheit/Ueb6/white2.jpg",
|
||||
@@ -251,7 +251,6 @@
|
||||
"Informationssicherheit/Ueb5/new UEB5.md",
|
||||
"Informationssicherheit/Ueb6",
|
||||
"Informationssicherheit/Ueb5/05-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/Ueb4/04-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/Ueb5/Ueb5.md",
|
||||
"Informationssicherheit/Ueb4/Ueb4.md",
|
||||
"Mathe/KW20/KW20.md",
|
||||
@@ -271,7 +270,6 @@
|
||||
"Mathe/KW16/UEB.md",
|
||||
"CCN/Ex01/Exercise 1.md",
|
||||
"CCN/Ex01/2023-04-18_11-08.png",
|
||||
"Algorithmen und Datenstrukturen/UEB03/UEB03.md",
|
||||
"Informationssicherheit/Ueb2/2023-04-17_15-55.png",
|
||||
"Informationssicherheit/Ueb2/2023-04-17_14-16.png",
|
||||
"Informationssicherheit/Ueb1/20230330_19h30m31s_grim.png",
|
||||
|
||||
Reference in New Issue
Block a user