310 lines
8.7 KiB
JSON
310 lines
8.7 KiB
JSON
{
|
|
"main": {
|
|
"id": "1345ce316d57bf13",
|
|
"type": "split",
|
|
"children": [
|
|
{
|
|
"id": "08ad9b53ade42d31",
|
|
"type": "tabs",
|
|
"dimension": 65.30501089324619,
|
|
"children": [
|
|
{
|
|
"id": "9ef2752e5e7b81c3",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "markdown",
|
|
"state": {
|
|
"file": "English/KW21.md",
|
|
"mode": "source",
|
|
"source": false
|
|
}
|
|
}
|
|
},
|
|
{
|
|
"id": "94f939e1416fe53d",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "markdown",
|
|
"state": {
|
|
"file": "Informationssicherheit/Ueb5/Ueb5.md",
|
|
"mode": "source",
|
|
"source": false
|
|
}
|
|
}
|
|
},
|
|
{
|
|
"id": "ac30fcb197f4fd3d",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "markdown",
|
|
"state": {
|
|
"file": "Informationssicherheit/Ueb6/Ueb 6.md",
|
|
"mode": "preview",
|
|
"source": false
|
|
}
|
|
}
|
|
}
|
|
],
|
|
"currentTab": 2
|
|
},
|
|
{
|
|
"id": "47553fa673bb1eb6",
|
|
"type": "tabs",
|
|
"dimension": 34.694989106753816,
|
|
"children": [
|
|
{
|
|
"id": "923f0d93a2fb61f2",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "pdf",
|
|
"state": {
|
|
"file": "Informationssicherheit/Ueb5/05-ueb_uebungsblatt.pdf"
|
|
}
|
|
}
|
|
},
|
|
{
|
|
"id": "34ee5201781b004b",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "pdf",
|
|
"state": {
|
|
"file": "English/Matters Technik - IT Matters 3rd EditionB1B2 - Englisch Für IT-Berufe Schülerbuch (Isobel E. Williams) (Z-Library).pdf"
|
|
}
|
|
}
|
|
},
|
|
{
|
|
"id": "9a3ca912f94ab62b",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "pdf",
|
|
"state": {
|
|
"file": "Informationssicherheit/Ueb6/06-ueb_uebungsblatt.pdf"
|
|
}
|
|
}
|
|
}
|
|
],
|
|
"currentTab": 2
|
|
}
|
|
],
|
|
"direction": "vertical"
|
|
},
|
|
"left": {
|
|
"id": "e5fbdfc2085faa4b",
|
|
"type": "split",
|
|
"children": [
|
|
{
|
|
"id": "e02674fc64edf0b5",
|
|
"type": "tabs",
|
|
"children": [
|
|
{
|
|
"id": "b8336cb3c3d06be9",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "file-explorer",
|
|
"state": {
|
|
"sortOrder": "alphabetical"
|
|
}
|
|
}
|
|
},
|
|
{
|
|
"id": "14611a26bf336471",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "search",
|
|
"state": {
|
|
"query": "",
|
|
"matchingCase": false,
|
|
"explainSearch": false,
|
|
"collapseAll": false,
|
|
"extraContext": false,
|
|
"sortOrder": "alphabetical"
|
|
}
|
|
}
|
|
},
|
|
{
|
|
"id": "344d14435301d3da",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "starred",
|
|
"state": {}
|
|
}
|
|
},
|
|
{
|
|
"id": "50de9879caa2f002",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "bookmarks",
|
|
"state": {}
|
|
}
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"direction": "horizontal",
|
|
"width": 200,
|
|
"collapsed": true
|
|
},
|
|
"right": {
|
|
"id": "70ae06261ef3fc74",
|
|
"type": "split",
|
|
"children": [
|
|
{
|
|
"id": "07672eb406645795",
|
|
"type": "tabs",
|
|
"children": [
|
|
{
|
|
"id": "827e4aecb1891b44",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "backlink",
|
|
"state": {
|
|
"file": "Informationssicherheit/Ueb6/Ueb 6.md",
|
|
"collapseAll": false,
|
|
"extraContext": false,
|
|
"sortOrder": "alphabetical",
|
|
"showSearch": false,
|
|
"searchQuery": "",
|
|
"backlinkCollapsed": false,
|
|
"unlinkedCollapsed": true
|
|
}
|
|
}
|
|
},
|
|
{
|
|
"id": "583573a993e5af09",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "outgoing-link",
|
|
"state": {
|
|
"file": "Informationssicherheit/Ueb6/Ueb 6.md",
|
|
"linksCollapsed": false,
|
|
"unlinkedCollapsed": true
|
|
}
|
|
}
|
|
},
|
|
{
|
|
"id": "fbf143571343fb20",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "tag",
|
|
"state": {
|
|
"sortOrder": "frequency",
|
|
"useHierarchy": true
|
|
}
|
|
}
|
|
},
|
|
{
|
|
"id": "457947aad2c5e591",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "outline",
|
|
"state": {
|
|
"file": "Informationssicherheit/Ueb6/Ueb 6.md"
|
|
}
|
|
}
|
|
},
|
|
{
|
|
"id": "631d374a04a792db",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "advanced-tables-toolbar",
|
|
"state": {}
|
|
}
|
|
},
|
|
{
|
|
"id": "b3aa4e2b20626da4",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "calendar",
|
|
"state": {}
|
|
}
|
|
},
|
|
{
|
|
"id": "c3c39c68e6060e3e",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "juggl_nodes",
|
|
"state": {}
|
|
}
|
|
},
|
|
{
|
|
"id": "ccdfcdb588345764",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "juggl_style",
|
|
"state": {}
|
|
}
|
|
}
|
|
],
|
|
"currentTab": 4
|
|
}
|
|
],
|
|
"direction": "horizontal",
|
|
"width": 200,
|
|
"collapsed": true
|
|
},
|
|
"left-ribbon": {
|
|
"hiddenItems": {
|
|
"obsidian-excalidraw-plugin:Create new drawing": false,
|
|
"obsidian-wordnet-plugin:WordNet Dictionary": false,
|
|
"obsidian-livesync:Replicate": false,
|
|
"obsidian-livesync:Show log": false,
|
|
"switcher:Open quick switcher": false,
|
|
"graph:Open graph view": false,
|
|
"canvas:Create new canvas": false,
|
|
"daily-notes:Open today's daily note": false,
|
|
"templates:Insert template": false,
|
|
"command-palette:Open command palette": false,
|
|
"table-editor-obsidian:Advanced Tables Toolbar": false,
|
|
"obsidian-advanced-slides:Show Slide Preview": false,
|
|
"juggl:Juggl global graph": false
|
|
}
|
|
},
|
|
"active": "ac30fcb197f4fd3d",
|
|
"lastOpenFiles": [
|
|
"Informationssicherheit/Ueb6/06-ueb_uebungsblatt.pdf",
|
|
"Informationssicherheit/Ueb6/Ueb 6.md",
|
|
"Informationssicherheit/Ueb5/new UEB5.md",
|
|
"Informationssicherheit/Ueb6",
|
|
"Informationssicherheit/Ueb5/05-ueb_uebungsblatt.pdf",
|
|
"Informationssicherheit/Ueb4/04-ueb_uebungsblatt.pdf",
|
|
"Informationssicherheit/Ueb5/Ueb5.md",
|
|
"Informationssicherheit/Ueb4/Ueb4.pdf",
|
|
"English/Matters Technik - IT Matters 3rd EditionB1B2 - Englisch Für IT-Berufe Schülerbuch (Isobel E. Williams) (Z-Library).pdf",
|
|
"English/KW21.md",
|
|
"Informationssicherheit/Ueb4/Ueb4.md",
|
|
"Mathe/KW20/KW20-VekRau_vor.pdf",
|
|
"Mathe/KW20/KW20-VekRau.pdf",
|
|
"Mathe/KW20/KW20.md",
|
|
"Algorithmen und Datenstrukturen/VL/VL06/VL07.md",
|
|
"Informationssicherheit/Ueb5",
|
|
"Mathe/KW20",
|
|
"English/KW18.md",
|
|
"Mathe/KW17/KW17.md",
|
|
"Algorithmen und Datenstrukturen/UEB04/UEB4.md",
|
|
"Informationssicherheit/Ueb3/Ueb3.md",
|
|
"English/KW17.md",
|
|
"Untitled Diagram.svg",
|
|
"conflict-files-obsidian-git.md",
|
|
"CCN/Ex02/Exercise 2.md",
|
|
"CCN/Untitled.md",
|
|
"unterwäsche_austausch_nein.jpg.md",
|
|
"Informationssicherheit/Ueb2/Ueb2.md",
|
|
"CCN/VL01.md",
|
|
"Mathe/KW16/UEB.md",
|
|
"CCN/Ex01/Exercise 1.md",
|
|
"CCN/Ex01/2023-04-18_11-08.png",
|
|
"Algorithmen und Datenstrukturen/UEB03/UEB03.md",
|
|
"Algorithmen und Datenstrukturen/UEB01/UEB01.md",
|
|
"Informationssicherheit/Ueb2/2023-04-17_15-55.png",
|
|
"Informationssicherheit/Ueb2/2023-04-17_14-16.png",
|
|
"Untitled 1.md",
|
|
"Untitled.md",
|
|
"Excalidraw/Drawing 2023-04-17 08.21.36.excalidraw.md",
|
|
"Informationssicherheit/Ueb1/20230330_19h30m31s_grim.png",
|
|
"Informationssicherheit/Ueb1/20230330_19h34m13s_grim.png",
|
|
"Informationssicherheit/Ueb1/20230331_07h21m13s_grim.png",
|
|
"Informationssicherheit/Ueb1/20230331_10h28m24s_grim.png",
|
|
"Informationssicherheit/Ueb1/20230331_10h28m43s_grim.png",
|
|
"Informationssicherheit/Ueb1/20230331_14h12m43s_grim.png"
|
|
]
|
|
} |