Files
obsidian/FH/.obsidian/workspace.json

223 lines
6.1 KiB
JSON

{
"main": {
"id": "985a28639027cb68",
"type": "split",
"children": [
{
"id": "70d3e404042bb7e1",
"type": "tabs",
"dimension": 58.99100899100899,
"children": [
{
"id": "8d74a64b5bdd799c",
"type": "leaf",
"state": {
"type": "markdown",
"state": {
"file": "Informationssicherheit/Ueb2/Ueb2.md",
"mode": "source",
"source": false
}
}
}
]
},
{
"id": "09960489beb8807f",
"type": "tabs",
"dimension": 41.00899100899101,
"children": [
{
"id": "9acdf2a1e42ed9ec",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf"
}
}
}
]
}
],
"direction": "vertical"
},
"left": {
"id": "cddcefee340fb8a5",
"type": "split",
"children": [
{
"id": "94d495814220bf82",
"type": "tabs",
"children": [
{
"id": "70ca5d990fce7a86",
"type": "leaf",
"state": {
"type": "search",
"state": {
"query": "",
"matchingCase": false,
"explainSearch": false,
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical"
}
}
},
{
"id": "d5e695bcc8cab13d",
"type": "leaf",
"state": {
"type": "starred",
"state": {}
}
},
{
"id": "e66cc33cf17c042a",
"type": "leaf",
"state": {
"type": "file-explorer",
"state": {
"sortOrder": "alphabetical"
}
}
}
],
"currentTab": 2
}
],
"direction": "horizontal",
"width": 200
},
"right": {
"id": "4540e984d4c131f5",
"type": "split",
"children": [
{
"id": "b1ae273364c01df7",
"type": "tabs",
"children": [
{
"id": "3c5c1738be747670",
"type": "leaf",
"state": {
"type": "backlink",
"state": {
"file": "Informationssicherheit/Ueb2/Ueb2.md",
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical",
"showSearch": false,
"searchQuery": "",
"backlinkCollapsed": false,
"unlinkedCollapsed": true
}
}
},
{
"id": "a0e89b3fceee7653",
"type": "leaf",
"state": {
"type": "outgoing-link",
"state": {
"file": "Informationssicherheit/Ueb2/Ueb2.md",
"linksCollapsed": false,
"unlinkedCollapsed": true
}
}
},
{
"id": "a8d05e2876a81d16",
"type": "leaf",
"state": {
"type": "tag",
"state": {
"sortOrder": "frequency",
"useHierarchy": true
}
}
},
{
"id": "858dd4c3359fda1d",
"type": "leaf",
"state": {
"type": "outline",
"state": {
"file": "Informationssicherheit/Ueb2/Ueb2.md"
}
}
},
{
"id": "4965238a34ee95eb",
"type": "leaf",
"state": {
"type": "calendar",
"state": {}
}
},
{
"id": "838787be957ae435",
"type": "leaf",
"state": {
"type": "juggl_nodes",
"state": {}
}
},
{
"id": "974f4434812d0416",
"type": "leaf",
"state": {
"type": "juggl_style",
"state": {}
}
}
]
}
],
"direction": "horizontal",
"width": 200,
"collapsed": true
},
"left-ribbon": {
"hiddenItems": {
"switcher:Open quick switcher": false,
"graph:Open graph view": false,
"canvas:Create new canvas": false,
"daily-notes:Open today's daily note": false,
"templates:Insert template": false,
"command-palette:Open command palette": false,
"table-editor-obsidian:Advanced Tables Toolbar": false,
"obsidian-advanced-slides:Show Slide Preview": false,
"juggl:Juggl global graph": false
}
},
"active": "8d74a64b5bdd799c",
"lastOpenFiles": [
"2023-04-16.md",
"Informationssicherheit/Ueb2/Ueb2.md",
"Untitled Diagram.svg",
"Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf",
"Informationssicherheit/Ueb1/Ueb01.md",
"Informationssicherheit/Ueb1/01-ueb_uebungsblatt.pdf",
"Informationssicherheit/VL/01-orga-motivation-handout.pdf",
"Informationssicherheit/VL/02-terminologie-handout.pdf",
"Algorithmen und Datenstrukturen/UEB01.md",
"CCN/VL01.md",
"Informationssicherheit/VL/03-fm-orga-handout.pdf",
"Informationssicherheit/VL",
"Informationssicherheit/Ueb2",
"Informationssicherheit/Ueb1/Ueb01.pdf",
"Informationssicherheit/Ueb1/20230331_17h00m06s_grim.png",
"Informationssicherheit/Ueb1/20230331_16h29m50s_grim.png",
"Informationssicherheit/Ueb1/20230331_16h22m19s_grim.png",
"Informationssicherheit/Ueb1/20230331_16h21m51s_grim.png",
"Informationssicherheit/Ueb1/20230331_16h17m48s_grim.png",
"Informationssicherheit/Ueb1/20230331_14h12m43s_grim.png",
"Informationssicherheit/Ueb1/20230331_10h28m43s_grim.png",
"Informationssicherheit/Ueb1/20230331_10h28m24s_grim.png",
"Informationssicherheit/Ueb1/20230331_07h21m13s_grim.png",
"Informationssicherheit/Ueb1",
"Informationssicherheit"
]
}