vault backup: 2023-04-28 18:05:45

This commit is contained in:
2023-04-28 18:05:45 +02:00
parent 24e6491d2f
commit 91008abb99
4 changed files with 489 additions and 50 deletions

View File

@@ -6,16 +6,16 @@
{
"id": "3cd0f756afc6dabe",
"type": "tabs",
"dimension": 33.75411635565313,
"dimension": 44.73106476399561,
"children": [
{
"id": "acdcc782092ee6dd",
"id": "174e8faa1bace700",
"type": "leaf",
"state": {
"type": "markdown",
"state": {
"file": "Informationssicherheit/Ueb3/Ueb3.md",
"mode": "preview",
"file": "Informationssicherheit/Ueb4/Ueb4.md",
"mode": "source",
"source": false
}
}
@@ -25,7 +25,7 @@
{
"id": "23d6dbdd99a3239a",
"type": "tabs",
"dimension": 66.24588364434688,
"dimension": 55.26893523600439,
"children": [
{
"id": "7be15818b6431193",
@@ -33,7 +33,7 @@
"state": {
"type": "pdf",
"state": {
"file": "Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf"
"file": "Informationssicherheit/Ueb4/04-ueb_uebungsblatt.pdf"
}
}
}
@@ -112,7 +112,7 @@
"state": {
"type": "backlink",
"state": {
"file": "Informationssicherheit/Ueb3/Ueb3.md",
"file": "Informationssicherheit/Ueb4/Ueb4.md",
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical",
@@ -129,7 +129,7 @@
"state": {
"type": "outgoing-link",
"state": {
"file": "Informationssicherheit/Ueb3/Ueb3.md",
"file": "Informationssicherheit/Ueb4/Ueb4.md",
"linksCollapsed": false,
"unlinkedCollapsed": true
}
@@ -152,7 +152,7 @@
"state": {
"type": "outline",
"state": {
"file": "Informationssicherheit/Ueb3/Ueb3.md"
"file": "Informationssicherheit/Ueb4/Ueb4.md"
}
}
},
@@ -213,47 +213,13 @@
"obsidian-wordnet-plugin:WordNet Dictionary": false
}
},
"floating": {
"id": "98f7d6237184bebc",
"type": "floating",
"children": [
{
"id": "631eb3e05940a0f5",
"type": "window",
"children": [
{
"id": "2aae6746b5c6cf07",
"type": "tabs",
"children": [
{
"id": "6d4babaef09a1aa5",
"type": "leaf",
"state": {
"type": "markdown",
"state": {
"file": "Informationssicherheit/Ueb3/Ueb3.md",
"mode": "preview",
"source": false
}
}
}
]
}
],
"direction": "vertical",
"x": 1133,
"y": 45,
"width": 1118,
"height": 1454,
"maximize": false,
"zoom": 0
}
]
},
"active": "6d4babaef09a1aa5",
"active": "174e8faa1bace700",
"lastOpenFiles": [
"Informationssicherheit/Ueb3/Ueb3.md",
"Informationssicherheit/Ueb4/Ueb4.md",
"Informationssicherheit/Ueb4/04-ueb_uebungsblatt.pdf",
"Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf",
"Informationssicherheit/Ueb3/Ueb3.md",
"Informationssicherheit/Ueb4",
"Algorithmen und Datenstrukturen/UEB04/UEB04.pdf",
"CCN/Ex02/Exercise 2.md",
"CCN/Ex02/ccn1-exercise2.pdf",
@@ -266,8 +232,6 @@
"Untitled Diagram.svg",
"English",
"Mathe/KW17/KW17.md",
"Algorithmen und Datenstrukturen/UEB03/UEB03.pdf",
"Mathe/KW16/KW16-EWuuEV.pdf",
"Informationssicherheit/Ueb2/Ueb2.md",
"Algorithmen und Datenstrukturen/UEB03/UEB03.md",
"Mathe/KW16/UEB.md",