{ "main": { "id": "1345ce316d57bf13", "type": "split", "children": [ { "id": "08ad9b53ade42d31", "type": "tabs", "dimension": 56.94945848375451, "children": [ { "id": "4759485602209736", "type": "leaf", "state": { "type": "markdown", "state": { "file": "Informationssicherheit/Ueb4/Ueb4.md", "mode": "source", "source": false } } } ] }, { "id": "47553fa673bb1eb6", "type": "tabs", "dimension": 43.05054151624549, "children": [ { "id": "923f0d93a2fb61f2", "type": "leaf", "state": { "type": "pdf", "state": { "file": "Informationssicherheit/Ueb4/04-ueb_uebungsblatt.pdf" } } } ] } ], "direction": "vertical" }, "left": { "id": "e5fbdfc2085faa4b", "type": "split", "children": [ { "id": "e02674fc64edf0b5", "type": "tabs", "children": [ { "id": "b8336cb3c3d06be9", "type": "leaf", "state": { "type": "file-explorer", "state": { "sortOrder": "alphabetical" } } }, { "id": "14611a26bf336471", "type": "leaf", "state": { "type": "search", "state": { "query": "", "matchingCase": false, "explainSearch": false, "collapseAll": false, "extraContext": false, "sortOrder": "alphabetical" } } }, { "id": "344d14435301d3da", "type": "leaf", "state": { "type": "starred", "state": {} } } ] } ], "direction": "horizontal", "width": 300 }, "right": { "id": "70ae06261ef3fc74", "type": "split", "children": [ { "id": "07672eb406645795", "type": "tabs", "children": [ { "id": "827e4aecb1891b44", "type": "leaf", "state": { "type": "backlink", "state": { "file": "Informationssicherheit/Ueb4/Ueb4.md", "collapseAll": false, "extraContext": false, "sortOrder": "alphabetical", "showSearch": false, "searchQuery": "", "backlinkCollapsed": false, "unlinkedCollapsed": true } } }, { "id": "583573a993e5af09", "type": "leaf", "state": { "type": "outgoing-link", "state": { "file": "Informationssicherheit/Ueb4/Ueb4.md", "linksCollapsed": false, "unlinkedCollapsed": true } } }, { "id": "fbf143571343fb20", "type": "leaf", "state": { "type": "tag", "state": { "sortOrder": "frequency", "useHierarchy": true } } }, { "id": "457947aad2c5e591", "type": "leaf", "state": { "type": "outline", "state": { "file": "Informationssicherheit/Ueb4/Ueb4.md" } } }, { "id": "631d374a04a792db", "type": "leaf", "state": { "type": "advanced-tables-toolbar", "state": {} } }, { "id": "b3aa4e2b20626da4", "type": "leaf", "state": { "type": "calendar", "state": {} } }, { "id": "c3c39c68e6060e3e", "type": "leaf", "state": { "type": "juggl_nodes", "state": {} } }, { "id": "ccdfcdb588345764", "type": "leaf", "state": { "type": "juggl_style", "state": {} } } ], "currentTab": 4 } ], "direction": "horizontal", "width": 200, "collapsed": true }, "left-ribbon": { "hiddenItems": { "obsidian-excalidraw-plugin:Create new drawing": false, "obsidian-wordnet-plugin:WordNet Dictionary": false, "switcher:Open quick switcher": false, "graph:Open graph view": false, "canvas:Create new canvas": false, "daily-notes:Open today's daily note": false, "templates:Insert template": false, "command-palette:Open command palette": false, "table-editor-obsidian:Advanced Tables Toolbar": false, "obsidian-livesync:Replicate": false, "obsidian-livesync:Show log": false, "obsidian-advanced-slides:Show Slide Preview": false, "juggl:Juggl global graph": false } }, "active": "4759485602209736", "lastOpenFiles": [ "Informationssicherheit/Ueb4/Ueb4.pdf", "Mathe/KW17/KW17.md", "Informationssicherheit/Ueb4/04-ueb_uebungsblatt.pdf", "Mathe/KW17/KW17-GeoTra.pdf", "English/KW18.md", "Algorithmen und Datenstrukturen/UEB04/UEB04.pdf", "Algorithmen und Datenstrukturen/UEB04/UEB4.md", "Informationssicherheit/Ueb4/Ueb4.md", "Algorithmen und Datenstrukturen/UEB04", "Informationssicherheit/Ueb4", "Informationssicherheit/Ueb3/Ueb3.md", "English/Matters Technik - IT Matters 3rd EditionB1B2 - Englisch Für IT-Berufe Schülerbuch (Isobel E. Williams) (Z-Library).pdf", "English/KW17.md", "English", "Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf", "Untitled Diagram.svg", "Mathe/KW17/KW17-GeoTra_vor.pdf", "conflict-files-obsidian-git.md", "Mathe/KW17", "CCN/Ex02/Exercise 2.md", "CCN/Untitled.md", "unterwäsche_austausch_nein.jpg.md", "Informationssicherheit/Ueb2/Ueb2.md", "CCN/VL01.md", "Mathe/KW16/UEB.md", "CCN/Ex01/Exercise 1.md", "CCN/Ex01/2023-04-18_11-08.png", "Algorithmen und Datenstrukturen/UEB03/UEB03.md", "Algorithmen und Datenstrukturen/UEB01/UEB01.md", "Informationssicherheit/Ueb2/2023-04-17_15-55.png", "Informationssicherheit/Ueb2/2023-04-17_14-16.png", "Untitled 1.md", "Untitled.md", "Excalidraw/Drawing 2023-04-17 08.21.36.excalidraw.md", "Excalidraw/Drawing 2023-04-17 08.21.00.excalidraw.md", "FH/Informationssicherheit/Ueb2/Ueb2.md", "README.md", "FH/Informationssicherheit/Ueb2/test.md", "Informationssicherheit/Ueb2/test2.md", "Informationssicherheit/Ueb2/Untitled.md", "Informationssicherheit/Ueb1/20230330_19h30m31s_grim.png", "Informationssicherheit/Ueb1/20230330_19h34m13s_grim.png", "Informationssicherheit/Ueb1/20230331_07h21m13s_grim.png", "Informationssicherheit/Ueb1/20230331_10h28m24s_grim.png", "Informationssicherheit/Ueb1/20230331_10h28m43s_grim.png", "Informationssicherheit/Ueb1/20230331_14h12m43s_grim.png" ] }