vault backup: 2023-04-26 16:30:23
This commit is contained in:
41
.obsidian/workspace.json
vendored
41
.obsidian/workspace.json
vendored
@@ -6,45 +6,34 @@
|
||||
{
|
||||
"id": "3cd0f756afc6dabe",
|
||||
"type": "tabs",
|
||||
"dimension": 41.27332601536773,
|
||||
"dimension": 29.637760702524695,
|
||||
"children": [
|
||||
{
|
||||
"id": "cb14de1fb6ebd054",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "pdf",
|
||||
"state": {
|
||||
"file": "Algorithmen und Datenstrukturen/UEB04/UEB04.pdf"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "4503653a11a6290a",
|
||||
"id": "acdcc782092ee6dd",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "markdown",
|
||||
"state": {
|
||||
"file": "Algorithmen und Datenstrukturen/UEB04/UEB4.md",
|
||||
"file": "Informationssicherheit/Ueb3/Ueb3.md",
|
||||
"mode": "source",
|
||||
"source": false
|
||||
}
|
||||
}
|
||||
}
|
||||
],
|
||||
"currentTab": 1
|
||||
]
|
||||
},
|
||||
{
|
||||
"id": "23d6dbdd99a3239a",
|
||||
"type": "tabs",
|
||||
"dimension": 58.72667398463227,
|
||||
"dimension": 70.3622392974753,
|
||||
"children": [
|
||||
{
|
||||
"id": "9af9aea51a93dd6c",
|
||||
"id": "7be15818b6431193",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "pdf",
|
||||
"state": {
|
||||
"file": "Algorithmen und Datenstrukturen/UEB04/UEB04.pdf"
|
||||
"file": "Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf"
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -123,7 +112,7 @@
|
||||
"state": {
|
||||
"type": "backlink",
|
||||
"state": {
|
||||
"file": "Algorithmen und Datenstrukturen/UEB04/UEB4.md",
|
||||
"file": "Informationssicherheit/Ueb3/Ueb3.md",
|
||||
"collapseAll": false,
|
||||
"extraContext": false,
|
||||
"sortOrder": "alphabetical",
|
||||
@@ -140,7 +129,7 @@
|
||||
"state": {
|
||||
"type": "outgoing-link",
|
||||
"state": {
|
||||
"file": "Algorithmen und Datenstrukturen/UEB04/UEB4.md",
|
||||
"file": "Informationssicherheit/Ueb3/Ueb3.md",
|
||||
"linksCollapsed": false,
|
||||
"unlinkedCollapsed": true
|
||||
}
|
||||
@@ -163,7 +152,7 @@
|
||||
"state": {
|
||||
"type": "outline",
|
||||
"state": {
|
||||
"file": "Algorithmen und Datenstrukturen/UEB04/UEB4.md"
|
||||
"file": "Informationssicherheit/Ueb3/Ueb3.md"
|
||||
}
|
||||
}
|
||||
},
|
||||
@@ -224,21 +213,21 @@
|
||||
"obsidian-wordnet-plugin:WordNet Dictionary": false
|
||||
}
|
||||
},
|
||||
"active": "4503653a11a6290a",
|
||||
"active": "acdcc782092ee6dd",
|
||||
"lastOpenFiles": [
|
||||
"Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/Ueb3/Ueb3.md",
|
||||
"Algorithmen und Datenstrukturen/UEB04/UEB04.pdf",
|
||||
"CCN/Ex02/Exercise 2.md",
|
||||
"CCN/Ex02/ccn1-exercise2.pdf",
|
||||
"Algorithmen und Datenstrukturen/UEB04/UEB4.md",
|
||||
"Mathe/KW17/KW17-GeoTra_vor.pdf",
|
||||
"Informationssicherheit/Ueb3/Ueb3.md",
|
||||
"Algorithmen und Datenstrukturen/UEB04",
|
||||
"Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf",
|
||||
"English/Matters Technik - IT Matters 3rd EditionB1B2 - Englisch Für IT-Berufe Schülerbuch (Isobel E. Williams) (Z-Library).pdf",
|
||||
"Mathe/KW17/KW17-GeoTra.pdf",
|
||||
"English/KW17.md",
|
||||
"Untitled Diagram.svg",
|
||||
"CCN/Ex02/ccn1-exercise2.pdf",
|
||||
"English",
|
||||
"CCN/Ex02/Exercise 2.md",
|
||||
"Mathe/KW17/KW17.md",
|
||||
"Algorithmen und Datenstrukturen/UEB03/UEB03.pdf",
|
||||
"Mathe/KW16/KW16-EWuuEV.pdf",
|
||||
|
||||
Reference in New Issue
Block a user