Why is Bounded Accuracy called Bounded Accuracy?

I find the name “Bounded Accuracy” confusing. Bounded – Ok limitations, sure, but Accuracy – maybe because it limits how often a give roll is successful for higher vs lower level PCs, but not every skill check is about being accurate. Many are about lies or deceit and deliberate inaccuracy. It sounds like it should just be called a power cap.
My question is: How can I relate the term Bounded Accuracy to its meaning?

What is it called when someone glides through a building’s external door behind you?

One form of social engineering is the practice of running up to a building’s external door just as an employee is entering. The employee often holds the door open for the intruder, bypassing security systems (RFID systems, for example).

Is there a name for this specific practice?

Are these Called Shot rules balanced?

I am DM a campaign in DnD 5e, where the players have expressed a desire to be able to do Called Shots. I am not resistant to this idea, but what I do not want is for the Called Shots to be so useful that there is rarely a reason to do a normal attack.

Note, I know and agree with most of the downsides to called shots (Slows down the game, Monsters will use them vs players, etc), and intend to bring these issues up with my players. Knowing them however, I think they will want to play with these rules.

With this in mind, I have come up with the below rules:

Called Shots can only be made when an attack roll has advantage. When a called shot is requested, the attack roll loses the advantage. Some called shots are not always possible, depending on body shape/armor type. Every type of called shot also involves an AC bump.

There is an additional effect when a called shot is a critical hit.

Head

  • +4AC
  • -1d4 to Saving Throws for 1 round
  • Critical: Con save or Stunned for 1 round. On Success, -1d4 to Saving Throws for 2 rounds.

Arms

  • +2AC
  • Disadvantage on next attack
  • Critical: Disadvantage on all attack for 2 rounds, Str Save or drops what they are holding weapon.

Legs

  • +2AC
  • Speed is halved
  • Critical: Speed is 0, Str Save or fall prone

Chest

  • +2AC
  • -1d6 to Constitution Saving throws for 1 round
  • Critical: Incapacitated for 1 round

Eye

  • +4AC
  • Disadvantage on perception checks for 1d4 rounds
  • Critical: Blinded for 1 round

Ears

  • +3AC
  • Deafened for 1d4 rounds
  • Critical: Con save or Stunned for 1 round.

Important note, the main attackers in my party are an Arcane Trickster Rogue, and a Sharpshooter Monster Hunter Ranger. With that in mind, losing Advantage on the attack role is a serious downside. No one in the party has increased Critical Range.

Are there any significant balance concerns that I am not seeing here, or any effects that need to be adjusted/reworked?

When gpg encrypt is called from the command line, how is a key chosen to do the encryption?

I am using GnuPG. When gpg encrypt is called from the command line, how is a key chosen to do the encryption? It appears to me that -r, or –recipient, supplies a user id and that is the simple answer. I believe all of the examples I have looked at they show an email address for recipient, which is required input when creating your key. However, I was able to create 2 keys with the exact same user name, comment, and email address. How does gpg pick a key if there are two keys that have identical email addresses and that email address is used for the recipient? It seems to me like using key id would be the best way to do this, but I do not see that option.

What is the transluscent background of a modal dialog called?

These days it’s common for modal dialogs to also reduce the brightness of the background content, to make it clear that it can’t be interacted with. This is especially common on the web.

What is the name of the darkening behind the modal?

Example of a modal dialog

Since I’ve never known the standard name, I have resorted to a slightly silly name: sneezeguard.

Compiler Shows: Abort Called [migrated]

When does a C++ compiler give a this message : “terminate called after throwing an instance of ‘std::out_of_range'”? I was trying this problem a website. I wrote an algorithm but the code won’t compile.

enter image description here

The algorithm I wrote was this:

int stringSimilarity(string s) { int size=s.size(), sum=0;  for(int i=0; i<size; i++) {     string sub_str; int temp_sum=0;     //Creating a substring for comparison     for(int j=i, l=0; j<size, l<size-i; j++, l++)                {         sub_str.at(l)=s.at(j);     }      if(sub_str.at(0)==s.at(0))     {         temp_sum++;         int k=1;         while(sub_str.at(k)==s.at(k))         {             temp_sum++;             k++;         }     }     sum=sum+temp_sum; }  return sum;} 

Can someone please tell me where am I going wrong?

enter image description here

[ Politics ] Open Question : Did you see where Rose McGowan called out Hillary ?

“I knew that Hillary Clinton’s people, were protecting the Monster [Weinstein]. I can’t believe I used to support her. I guess predators are her style,” she tweeted to her 890,000 followers. “Hillary Clinton, did you have any concern for your husband’s victims? And what about HW victims? No? Didn’t think so,” she wrote.

[ Politics ] Open Question : Did you see where Rose McGowan called out Hillary ?

“I knew that Hillary Clinton’s people, were protecting the Monster [Weinstein]. I can’t believe I used to support her. I guess predators are her style,” she tweeted to her 890,000 followers. “Hillary Clinton, did you have any concern for your husband’s victims? And what about HW victims? No? Didn’t think so,” she wrote.

Why is TLS called application-level protocol? [duplicate]

This question already has an answer here:

  • What layer is TLS? 4 answers
  • TLS/SSL design and OSI model 1 answer
  • Where does SSL encryption take place? 8 answers

I read this paragraph from rabbitmq networking page:

Clients communicate with RabbitMQ over the network. All protocols supported by the broker are TCP-based. Both RabbitMQ and the operating system provide a number of knobs that can be tweaked. Some of them are directly related to TCP and IP operations, others have to do with application-level protocols such as TLS.

Why is TLS called application-level protocol?