diff --git a/.obsidian/workspace.json b/.obsidian/workspace.json index 73f2adc..68b13c5 100644 --- a/.obsidian/workspace.json +++ b/.obsidian/workspace.json @@ -6,7 +6,7 @@ { "id": "3cd0f756afc6dabe", "type": "tabs", - "dimension": 29.637760702524695, + "dimension": 33.75411635565313, "children": [ { "id": "acdcc782092ee6dd", @@ -15,7 +15,7 @@ "type": "markdown", "state": { "file": "Informationssicherheit/Ueb3/Ueb3.md", - "mode": "source", + "mode": "preview", "source": false } } @@ -25,7 +25,7 @@ { "id": "23d6dbdd99a3239a", "type": "tabs", - "dimension": 70.3622392974753, + "dimension": 66.24588364434688, "children": [ { "id": "7be15818b6431193", @@ -213,10 +213,47 @@ "obsidian-wordnet-plugin:WordNet Dictionary": false } }, + "floating": { + "id": "98f7d6237184bebc", + "type": "floating", + "children": [ + { + "id": "631eb3e05940a0f5", + "type": "window", + "children": [ + { + "id": "2aae6746b5c6cf07", + "type": "tabs", + "children": [ + { + "id": "6d4babaef09a1aa5", + "type": "leaf", + "state": { + "type": "markdown", + "state": { + "file": "Informationssicherheit/Ueb3/Ueb3.md", + "mode": "preview", + "source": false + } + } + } + ] + } + ], + "direction": "vertical", + "x": 5, + "y": 45, + "width": 2246, + "height": 1454, + "maximize": false, + "zoom": 0 + } + ] + }, "active": "acdcc782092ee6dd", "lastOpenFiles": [ - "Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf", "Informationssicherheit/Ueb3/Ueb3.md", + "Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf", "Algorithmen und Datenstrukturen/UEB04/UEB04.pdf", "CCN/Ex02/Exercise 2.md", "CCN/Ex02/ccn1-exercise2.pdf",