Files
obsidian/.obsidian/workspace.json

172 lines
4.7 KiB
JSON

{
"main": {
"id": "1345ce316d57bf13",
"type": "split",
"children": [
{
"id": "08ad9b53ade42d31",
"type": "tabs",
"children": [
{
"id": "bbc5927e93be148a",
"type": "leaf",
"state": {
"type": "markdown",
"state": {
"file": "FH/Informationssicherheit/Ueb1/Ueb01.md",
"mode": "source",
"source": false
}
}
}
]
}
],
"direction": "vertical"
},
"left": {
"id": "e5fbdfc2085faa4b",
"type": "split",
"children": [
{
"id": "e02674fc64edf0b5",
"type": "tabs",
"children": [
{
"id": "b8336cb3c3d06be9",
"type": "leaf",
"state": {
"type": "file-explorer",
"state": {
"sortOrder": "alphabetical"
}
}
},
{
"id": "14611a26bf336471",
"type": "leaf",
"state": {
"type": "search",
"state": {
"query": "",
"matchingCase": false,
"explainSearch": false,
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical"
}
}
},
{
"id": "344d14435301d3da",
"type": "leaf",
"state": {
"type": "starred",
"state": {}
}
}
]
}
],
"direction": "horizontal",
"width": 300
},
"right": {
"id": "70ae06261ef3fc74",
"type": "split",
"children": [
{
"id": "07672eb406645795",
"type": "tabs",
"children": [
{
"id": "827e4aecb1891b44",
"type": "leaf",
"state": {
"type": "backlink",
"state": {
"file": "FH/Informationssicherheit/Ueb1/Ueb01.md",
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical",
"showSearch": false,
"searchQuery": "",
"backlinkCollapsed": false,
"unlinkedCollapsed": true
}
}
},
{
"id": "583573a993e5af09",
"type": "leaf",
"state": {
"type": "outgoing-link",
"state": {
"file": "FH/Informationssicherheit/Ueb1/Ueb01.md",
"linksCollapsed": false,
"unlinkedCollapsed": true
}
}
},
{
"id": "fbf143571343fb20",
"type": "leaf",
"state": {
"type": "tag",
"state": {
"sortOrder": "frequency",
"useHierarchy": true
}
}
},
{
"id": "457947aad2c5e591",
"type": "leaf",
"state": {
"type": "outline",
"state": {
"file": "FH/Informationssicherheit/Ueb1/Ueb01.md"
}
}
}
]
}
],
"direction": "horizontal",
"width": 300,
"collapsed": true
},
"left-ribbon": {
"hiddenItems": {
"switcher:Open quick switcher": false,
"graph:Open graph view": false,
"canvas:Create new canvas": false,
"daily-notes:Open today's daily note": false,
"templates:Insert template": false,
"command-palette:Open command palette": false
}
},
"active": "bbc5927e93be148a",
"lastOpenFiles": [
"FH/Informationssicherheit/Ueb01.md",
"FH/Informationssicherheit/Ueb1/Ueb01.pdf",
"FH/Informationssicherheit/Ueb1/Ueb01.md",
"FH/Informationssicherheit/Ueb1/20230331_17h00m06s_grim.png",
"FH/Informationssicherheit/Ueb1/20230331_16h29m50s_grim.png",
"FH/Informationssicherheit/Ueb1/20230331_16h22m19s_grim.png",
"FH/Informationssicherheit/Ueb1/20230331_16h21m51s_grim.png",
"FH/Informationssicherheit/Ueb1/20230331_16h17m48s_grim.png",
"FH/Informationssicherheit/Ueb1/20230331_14h12m43s_grim.png",
"FH/Informationssicherheit/Ueb1/20230331_10h28m43s_grim.png",
"FH/Informationssicherheit/Ueb1/20230331_10h28m24s_grim.png",
"FH/Informationssicherheit/Ueb1/20230331_07h21m13s_grim.png",
"FH/Informationssicherheit/Ueb1/20230330_19h34m13s_grim.png",
"FH/Informationssicherheit/Ueb1",
"FH/Informationssicherheit/Neuer Ordner",
"FH/Algorithmen und Datenstrukturen/UEB01.md",
"FH/Algorithmen und Datenstrukturen",
"FH/Informationssicherheit/Ueb01.pdf",
"FH/Informationssicherheit",
"FH/CCN/VL01.md"
]
}