vault backup: 2023-05-16 08:35:24
This commit is contained in:
104
.obsidian/workspace.json
vendored
104
.obsidian/workspace.json
vendored
@@ -4,45 +4,36 @@
|
|||||||
"type": "split",
|
"type": "split",
|
||||||
"children": [
|
"children": [
|
||||||
{
|
{
|
||||||
"id": "3cd0f756afc6dabe",
|
"id": "08ad9b53ade42d31",
|
||||||
"type": "tabs",
|
"type": "tabs",
|
||||||
"dimension": 69.97804610318332,
|
"dimension": 56.94945848375451,
|
||||||
"children": [
|
"children": [
|
||||||
{
|
{
|
||||||
"id": "174e8faa1bace700",
|
"id": "4759485602209736",
|
||||||
"type": "leaf",
|
"type": "leaf",
|
||||||
"state": {
|
"state": {
|
||||||
"type": "pdf",
|
"type": "markdown",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "Mathe/KW17/KW17-GeoTra-solutions.pdf"
|
"file": "Informationssicherheit/Ueb4/Ueb4.md",
|
||||||
}
|
"mode": "source",
|
||||||
}
|
"source": false
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "aff038c8c11bcbc3",
|
|
||||||
"type": "leaf",
|
|
||||||
"state": {
|
|
||||||
"type": "pdf",
|
|
||||||
"state": {
|
|
||||||
"file": "Mathe/KW16/KW16-EWuuEV-sol.pdf"
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
],
|
]
|
||||||
"currentTab": 1
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"id": "23d6dbdd99a3239a",
|
"id": "47553fa673bb1eb6",
|
||||||
"type": "tabs",
|
"type": "tabs",
|
||||||
"dimension": 30.021953896816683,
|
"dimension": 43.05054151624549,
|
||||||
"children": [
|
"children": [
|
||||||
{
|
{
|
||||||
"id": "0500a777cdc7d2fc",
|
"id": "923f0d93a2fb61f2",
|
||||||
"type": "leaf",
|
"type": "leaf",
|
||||||
"state": {
|
"state": {
|
||||||
"type": "pdf",
|
"type": "pdf",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "Mathe/KW17/KW17-GeoTra.pdf"
|
"file": "Informationssicherheit/Ueb4/04-ueb_uebungsblatt.pdf"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -63,8 +54,10 @@
|
|||||||
"id": "b8336cb3c3d06be9",
|
"id": "b8336cb3c3d06be9",
|
||||||
"type": "leaf",
|
"type": "leaf",
|
||||||
"state": {
|
"state": {
|
||||||
"type": "empty",
|
"type": "file-explorer",
|
||||||
"state": {}
|
"state": {
|
||||||
|
"sortOrder": "alphabetical"
|
||||||
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@@ -91,21 +84,18 @@
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"id": "c9a36b89afbe26ec",
|
"id": "50de9879caa2f002",
|
||||||
"type": "leaf",
|
"type": "leaf",
|
||||||
"state": {
|
"state": {
|
||||||
"type": "file-explorer",
|
"type": "bookmarks",
|
||||||
"state": {
|
"state": {}
|
||||||
"sortOrder": "alphabetical"
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
],
|
]
|
||||||
"currentTab": 3
|
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"direction": "horizontal",
|
"direction": "horizontal",
|
||||||
"width": 379.5
|
"width": 300
|
||||||
},
|
},
|
||||||
"right": {
|
"right": {
|
||||||
"id": "70ae06261ef3fc74",
|
"id": "70ae06261ef3fc74",
|
||||||
@@ -121,7 +111,7 @@
|
|||||||
"state": {
|
"state": {
|
||||||
"type": "backlink",
|
"type": "backlink",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "Mathe/KW16/KW16-EWuuEV-sol.pdf",
|
"file": "Informationssicherheit/Ueb4/Ueb4.md",
|
||||||
"collapseAll": false,
|
"collapseAll": false,
|
||||||
"extraContext": false,
|
"extraContext": false,
|
||||||
"sortOrder": "alphabetical",
|
"sortOrder": "alphabetical",
|
||||||
@@ -138,7 +128,7 @@
|
|||||||
"state": {
|
"state": {
|
||||||
"type": "outgoing-link",
|
"type": "outgoing-link",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "Mathe/KW16/KW16-EWuuEV-sol.pdf",
|
"file": "Informationssicherheit/Ueb4/Ueb4.md",
|
||||||
"linksCollapsed": false,
|
"linksCollapsed": false,
|
||||||
"unlinkedCollapsed": true
|
"unlinkedCollapsed": true
|
||||||
}
|
}
|
||||||
@@ -161,7 +151,7 @@
|
|||||||
"state": {
|
"state": {
|
||||||
"type": "outline",
|
"type": "outline",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "Mathe/KW16/KW16-EWuuEV-sol.pdf"
|
"file": "Informationssicherheit/Ueb4/Ueb4.md"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@@ -208,6 +198,7 @@
|
|||||||
"left-ribbon": {
|
"left-ribbon": {
|
||||||
"hiddenItems": {
|
"hiddenItems": {
|
||||||
"obsidian-excalidraw-plugin:Create new drawing": false,
|
"obsidian-excalidraw-plugin:Create new drawing": false,
|
||||||
|
"obsidian-wordnet-plugin:WordNet Dictionary": false,
|
||||||
"obsidian-livesync:Replicate": false,
|
"obsidian-livesync:Replicate": false,
|
||||||
"obsidian-livesync:Show log": false,
|
"obsidian-livesync:Show log": false,
|
||||||
"switcher:Open quick switcher": false,
|
"switcher:Open quick switcher": false,
|
||||||
@@ -218,38 +209,41 @@
|
|||||||
"command-palette:Open command palette": false,
|
"command-palette:Open command palette": false,
|
||||||
"table-editor-obsidian:Advanced Tables Toolbar": false,
|
"table-editor-obsidian:Advanced Tables Toolbar": false,
|
||||||
"obsidian-advanced-slides:Show Slide Preview": false,
|
"obsidian-advanced-slides:Show Slide Preview": false,
|
||||||
"juggl:Juggl global graph": false,
|
"juggl:Juggl global graph": false
|
||||||
"obsidian-wordnet-plugin:WordNet Dictionary": false
|
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"active": "aff038c8c11bcbc3",
|
"active": "b8336cb3c3d06be9",
|
||||||
"lastOpenFiles": [
|
"lastOpenFiles": [
|
||||||
"Mathe/KW16/KW16-EWuuEV.pdf",
|
|
||||||
"Mathe/KW16/KW16-EWuuEV-sol.pdf",
|
|
||||||
"Mathe/KW17/KW17-GeoTra.pdf",
|
|
||||||
"Mathe/KW17/KW17-GeoTra_vor.pdf",
|
|
||||||
"English/Matters Technik - IT Matters 3rd EditionB1B2 - Englisch Für IT-Berufe Schülerbuch (Isobel E. Williams) (Z-Library).pdf",
|
|
||||||
"Mathe/KW17/KW17-GeoTra-solutions.pdf",
|
"Mathe/KW17/KW17-GeoTra-solutions.pdf",
|
||||||
"English/KW18.md",
|
"Mathe/KW16/KW16-EWuuEV-sol.pdf",
|
||||||
|
"Informationssicherheit/Ueb5/05-ueb_uebungsblatt.pdf",
|
||||||
"Informationssicherheit/Ueb4/Ueb4.md",
|
"Informationssicherheit/Ueb4/Ueb4.md",
|
||||||
|
"Informationssicherheit/Ueb5/Ueb5.md",
|
||||||
|
"Informationssicherheit/Ueb5",
|
||||||
|
"English/KW18.md",
|
||||||
"Informationssicherheit/Ueb4/Ueb4.pdf",
|
"Informationssicherheit/Ueb4/Ueb4.pdf",
|
||||||
|
"Mathe/KW17/KW17.md",
|
||||||
"Informationssicherheit/Ueb4/04-ueb_uebungsblatt.pdf",
|
"Informationssicherheit/Ueb4/04-ueb_uebungsblatt.pdf",
|
||||||
"Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf",
|
"Mathe/KW17/KW17-GeoTra.pdf",
|
||||||
"Informationssicherheit/Ueb3/Ueb3.md",
|
|
||||||
"Informationssicherheit/Ueb4",
|
|
||||||
"Algorithmen und Datenstrukturen/UEB04/UEB04.pdf",
|
"Algorithmen und Datenstrukturen/UEB04/UEB04.pdf",
|
||||||
"CCN/Ex02/Exercise 2.md",
|
|
||||||
"Algorithmen und Datenstrukturen/UEB04/UEB4.md",
|
"Algorithmen und Datenstrukturen/UEB04/UEB4.md",
|
||||||
|
"Algorithmen und Datenstrukturen/UEB04",
|
||||||
|
"Informationssicherheit/Ueb4",
|
||||||
|
"Informationssicherheit/Ueb3/Ueb3.md",
|
||||||
|
"English/Matters Technik - IT Matters 3rd EditionB1B2 - Englisch Für IT-Berufe Schülerbuch (Isobel E. Williams) (Z-Library).pdf",
|
||||||
"English/KW17.md",
|
"English/KW17.md",
|
||||||
"Untitled Diagram.svg",
|
"Untitled Diagram.svg",
|
||||||
"Mathe/KW17/KW17.md",
|
"conflict-files-obsidian-git.md",
|
||||||
|
"CCN/Ex02/Exercise 2.md",
|
||||||
|
"CCN/Untitled.md",
|
||||||
|
"unterwäsche_austausch_nein.jpg.md",
|
||||||
"Informationssicherheit/Ueb2/Ueb2.md",
|
"Informationssicherheit/Ueb2/Ueb2.md",
|
||||||
"Algorithmen und Datenstrukturen/UEB03/UEB03.md",
|
"CCN/VL01.md",
|
||||||
"Mathe/KW16/UEB.md",
|
"Mathe/KW16/UEB.md",
|
||||||
"README.md",
|
|
||||||
"CCN/Ex01/Exercise 1.md",
|
"CCN/Ex01/Exercise 1.md",
|
||||||
"CCN/Ex01/2023-04-18_11-08.png",
|
"CCN/Ex01/2023-04-18_11-08.png",
|
||||||
"CCN/VL01.md",
|
"Algorithmen und Datenstrukturen/UEB03/UEB03.md",
|
||||||
|
"Algorithmen und Datenstrukturen/UEB01/UEB01.md",
|
||||||
"Informationssicherheit/Ueb2/2023-04-17_15-55.png",
|
"Informationssicherheit/Ueb2/2023-04-17_15-55.png",
|
||||||
"Informationssicherheit/Ueb2/2023-04-17_14-16.png",
|
"Informationssicherheit/Ueb2/2023-04-17_14-16.png",
|
||||||
"Untitled 1.md",
|
"Untitled 1.md",
|
||||||
@@ -257,18 +251,14 @@
|
|||||||
"Excalidraw/Drawing 2023-04-17 08.21.36.excalidraw.md",
|
"Excalidraw/Drawing 2023-04-17 08.21.36.excalidraw.md",
|
||||||
"Excalidraw/Drawing 2023-04-17 08.21.00.excalidraw.md",
|
"Excalidraw/Drawing 2023-04-17 08.21.00.excalidraw.md",
|
||||||
"FH/Informationssicherheit/Ueb2/Ueb2.md",
|
"FH/Informationssicherheit/Ueb2/Ueb2.md",
|
||||||
|
"README.md",
|
||||||
"FH/Informationssicherheit/Ueb2/test.md",
|
"FH/Informationssicherheit/Ueb2/test.md",
|
||||||
"Informationssicherheit/Ueb2/test2.md",
|
"Informationssicherheit/Ueb2/test2.md",
|
||||||
"Informationssicherheit/Ueb2/Untitled.md",
|
|
||||||
"Informationssicherheit/Ueb1/20230330_19h30m31s_grim.png",
|
"Informationssicherheit/Ueb1/20230330_19h30m31s_grim.png",
|
||||||
"Informationssicherheit/Ueb1/20230330_19h34m13s_grim.png",
|
"Informationssicherheit/Ueb1/20230330_19h34m13s_grim.png",
|
||||||
"Informationssicherheit/Ueb1/20230331_07h21m13s_grim.png",
|
"Informationssicherheit/Ueb1/20230331_07h21m13s_grim.png",
|
||||||
"Informationssicherheit/Ueb1/20230331_10h28m24s_grim.png",
|
"Informationssicherheit/Ueb1/20230331_10h28m24s_grim.png",
|
||||||
"Informationssicherheit/Ueb1/20230331_10h28m43s_grim.png",
|
"Informationssicherheit/Ueb1/20230331_10h28m43s_grim.png",
|
||||||
"Informationssicherheit/Ueb1/20230331_14h12m43s_grim.png",
|
"Informationssicherheit/Ueb1/20230331_14h12m43s_grim.png"
|
||||||
"Informationssicherheit/Ueb1/Ueb01.md",
|
|
||||||
"Algorithmen und Datenstrukturen/UEB01/UEB01.md",
|
|
||||||
"2023-04-16.md",
|
|
||||||
"FH/2023-04-16.md"
|
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
Reference in New Issue
Block a user