 
| Zeit | Veranstaltung | Dozent | Raum | 
|---|---|---|---|
| 11:30 - 13:00 | Logik | Eick | PK 2.2 | 
| 15:00 - 16:30 | Theoretische Informatik I | Adamek | Audi Max | 
| 09:45 - 10:30 | Logik | Eick | PK 2.2 | 
| 12:20 - 13:50 | Technische Informatik II | Ernst | PK 2.2 | 
| 15:00 - 16:30 | Software Engineering | Rumpe | PK 2.2 | 
| 08:00 - 09:30 | Theoretische Informatik I | Adamek | Audi Max | 
| 09:45 - 10:30 | Technische Informatik II gr. Uebung | Ernst | PK 2.2 | 
| 10:30 - 11:15 | Technische Informatik II | Ernst | PK 2.2 | 
| 13:15 - 14:45 | Grundlagen zur Datensicherheit | Gerndt | HS 66.2 | 
| 15:00 - 15:45 | Grundlagen zur Datensicherheit gr. Uebung | Gerndt | HS 66.2 | 
| 15:50 - 17:30 | Software Engineering | Rumpe | PK 2.1 | 
 Created by Boris Buegling.
100 % handcoded HTML. 
Created with ViM.
Created by Boris Buegling.
100 % handcoded HTML. 
Created with ViM.