Files
obsidian/.obsidian/workspace.json

275 lines
8.4 KiB
JSON

{
"main": {
"id": "1345ce316d57bf13",
"type": "split",
"children": [
{
"id": "e403734ae4b6cb9c",
"type": "tabs",
"children": [
{
"id": "d668440913b05378",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "Informationssicherheit/Ilias/Vorlesungen/10-sichere-software-entwicklung-handout.pdf"
}
}
},
{
"id": "37fb4be3bf0d3154",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "Algorithmen und Datenstrukturen/Ilias/VL10 - Sortieren 2/VL10-Sortieren_2.pdf"
}
}
},
{
"id": "0fd4f7bfbf2ab7da",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "Algorithmen und Datenstrukturen/Ilias/Alte Klausuren/36-Klausur vom 08.09.2021_MI_WI_final_ohnePW.pdf"
}
}
},
{
"id": "7a651a23dd98eda7",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "CCN/Ilias/Lecture/CCN-6 - ApplicationLayer.pdf"
}
}
}
],
"currentTab": 2
}
],
"direction": "vertical"
},
"left": {
"id": "e5fbdfc2085faa4b",
"type": "split",
"children": [
{
"id": "e02674fc64edf0b5",
"type": "tabs",
"children": [
{
"id": "b8336cb3c3d06be9",
"type": "leaf",
"state": {
"type": "file-explorer",
"state": {
"sortOrder": "alphabetical"
}
}
},
{
"id": "14611a26bf336471",
"type": "leaf",
"state": {
"type": "search",
"state": {
"query": "",
"matchingCase": false,
"explainSearch": false,
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical"
}
}
},
{
"id": "344d14435301d3da",
"type": "leaf",
"state": {
"type": "starred",
"state": {}
}
},
{
"id": "50de9879caa2f002",
"type": "leaf",
"state": {
"type": "bookmarks",
"state": {}
}
}
]
}
],
"direction": "horizontal",
"width": 300
},
"right": {
"id": "70ae06261ef3fc74",
"type": "split",
"children": [
{
"id": "07672eb406645795",
"type": "tabs",
"children": [
{
"id": "827e4aecb1891b44",
"type": "leaf",
"state": {
"type": "backlink",
"state": {
"file": "Algorithmen und Datenstrukturen/Ilias/Alte Klausuren/36-Klausur vom 08.09.2021_MI_WI_final_ohnePW.pdf",
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical",
"showSearch": false,
"searchQuery": "",
"backlinkCollapsed": false,
"unlinkedCollapsed": true
}
}
},
{
"id": "583573a993e5af09",
"type": "leaf",
"state": {
"type": "outgoing-link",
"state": {
"file": "Algorithmen und Datenstrukturen/Ilias/Alte Klausuren/36-Klausur vom 08.09.2021_MI_WI_final_ohnePW.pdf",
"linksCollapsed": false,
"unlinkedCollapsed": true
}
}
},
{
"id": "fbf143571343fb20",
"type": "leaf",
"state": {
"type": "tag",
"state": {
"sortOrder": "frequency",
"useHierarchy": true
}
}
},
{
"id": "457947aad2c5e591",
"type": "leaf",
"state": {
"type": "outline",
"state": {
"file": "Algorithmen und Datenstrukturen/Ilias/Alte Klausuren/36-Klausur vom 08.09.2021_MI_WI_final_ohnePW.pdf"
}
}
},
{
"id": "631d374a04a792db",
"type": "leaf",
"state": {
"type": "advanced-tables-toolbar",
"state": {}
}
},
{
"id": "b3aa4e2b20626da4",
"type": "leaf",
"state": {
"type": "calendar",
"state": {}
}
},
{
"id": "c3c39c68e6060e3e",
"type": "leaf",
"state": {
"type": "juggl_nodes",
"state": {}
}
},
{
"id": "ccdfcdb588345764",
"type": "leaf",
"state": {
"type": "juggl_style",
"state": {}
}
}
],
"currentTab": 4
}
],
"direction": "horizontal",
"width": 200,
"collapsed": true
},
"left-ribbon": {
"hiddenItems": {
"switcher:Open quick switcher": false,
"graph:Open graph view": false,
"canvas:Create new canvas": false,
"daily-notes:Open today's daily note": false,
"templates:Insert template": false,
"command-palette:Open command palette": false,
"table-editor-obsidian:Advanced Tables Toolbar": false,
"obsidian-advanced-slides:Show Slide Preview": false,
"juggl:Juggl global graph": false,
"obsidian-livesync:Replicate": false,
"obsidian-livesync:Show log": false,
"obsidian-excalidraw-plugin:Create new drawing": false,
"obsidian-wordnet-plugin:WordNet Dictionary": false
}
},
"active": "0fd4f7bfbf2ab7da",
"lastOpenFiles": [
"Algorithmen und Datenstrukturen/Ilias/Alte Klausuren/37-Klausur vom 07.02.2022 ohnePW.pdf",
"Algorithmen und Datenstrukturen/Ilias/Alte Klausuren/38-Klausur vom 11.08.2022_korr.pdf",
"Algorithmen und Datenstrukturen/Ilias/Alte Klausuren/39-Klausur vom 08.02.2023_final.pdf",
"Algorithmen und Datenstrukturen/Ilias/VL10 - Sortieren 2/VL10-Sortieren_2.pdf",
"Algorithmen und Datenstrukturen/Ilias/VL03 - Listen/VL03-Listen.pdf",
"CCN/Ilias/Lecture/CCN-6 - ApplicationLayer.pdf",
"Algorithmen und Datenstrukturen/Ilias/VL01 - Algorithmen/VL01-Algorithmen.pdf",
"Algorithmen und Datenstrukturen/Ilias/VL03 - Listen/UEB03.pdf",
"Algorithmen und Datenstrukturen/Ilias/VL02 - Komplexität/UEB02.pdf",
"Algorithmen und Datenstrukturen/Ilias/VL02 - Komplexität/VL02-Komplexitaet.pdf",
"Algorithmen und Datenstrukturen/Ilias/VL01 - Algorithmen/UEB01.pdf",
"Informationssicherheit/Ueb9/UEB_09.md",
"English/KW26.md",
"Informationssicherheit/Ueb7/Ueb07.md",
"Informationssicherheit/UEB8/UEB08.md",
"Informationssicherheit/Ueb6/Ueb 6.md",
"English/KW21.md",
"Informationssicherheit/Ueb5/new UEB5.md",
"Informationssicherheit/Ueb5/Ueb5.md",
"Informationssicherheit/Ueb4/Ueb4.md",
"Mathe/KW20/KW20.md",
"Informationssicherheit/Ueb4/Ueb4 - Kopie.md",
"Algorithmen und Datenstrukturen/VL/VL06/VL07.md",
"English/KW18.md",
"Mathe/KW17/KW17.md",
"Mathe/KW20.md",
"Algorithmen und Datenstrukturen/UEB04/UEB4.md",
"Informationssicherheit/Ueb3/Ueb3.md",
"English/KW17.md",
"Untitled Diagram.svg",
"conflict-files-obsidian-git.md",
"CCN/Ex02/Exercise 2.md",
"CCN/Untitled.md",
"unterwäsche_austausch_nein.jpg.md",
"Informationssicherheit/Ueb2/Ueb2.md",
"CCN/VL01.md",
"Mathe/KW16/UEB.md",
"CCN/Ex01/2023-04-18_11-08.png",
"Informationssicherheit/Ueb2/2023-04-17_15-55.png",
"Informationssicherheit/Ueb2/2023-04-17_14-16.png",
"Informationssicherheit/Ueb1/20230330_19h30m31s_grim.png",
"Informationssicherheit/Ueb1/20230330_19h34m13s_grim.png",
"Informationssicherheit/Ueb1/20230331_07h21m13s_grim.png",
"Informationssicherheit/Ueb1/20230331_10h28m24s_grim.png",
"Informationssicherheit/Ueb1/20230331_10h28m43s_grim.png",
"Informationssicherheit/Ueb1/20230331_14h12m43s_grim.png"
]
}