While the Condensed skill list seems to me to be (and its Core predecessor to have been) comprehensive enough to cover nearly all ‘adventuring’ activities with little to no alterations required, I have encountered a case for which I’m unsure which of the skills would be appropriate to use. That case in question involves the competence at playing card or similar games with a significant cerebral element, such as Bridge, Sabacc, Poker and the like (as opposed to games that are pure or nearly pure chance with no skill involved). And it’s one that I expect to come up in a campaign for reasons of both PC personalities and campaign genre.
Ways of Creating an Advantage are pretty obvious – Empathy/Deceive for noticing/concealing tells, Burglary for cheating, Academics for leveraging the knowledge of the meta etc. But what about the main contest? What skill from the Default List makes the most sense to apply for actually being competent at the technical, practical side of playing the game (not the surrounding auxiliary topics used for Advantages), and what is the reasoning behind the choice?
Choices that I considered but am inclined see as off are: Will, because its bizarre provision of also covering intense cerebral effort seems to have been discontinued with the transition from Core to Condensed (one of the few unannounced major changes); Academics, because it seems very theoretical; Burglary, because that one’s description implies it would cover an illicit approach to winning, not a fair one. But maybe my reasoning is flawed and one of the choices is more applicable than it seems to me. Or maybe I’m overlooking a different but more appropriate option.
I cannot do anything about government agencies, but I doubt that they are interested in me.
I do not like the idea of Google, FaceTweet, etc, compiling data on me.
What’s the best way to prevent them doing so, if I purchase a smartphone – buy a pay as you go (unregistered) SIM, or use only public WiFi? Would a Linux ‘phone make a major difference?
Is there a tool, a device or an app that could restore my calls history from the sim card itself? is it possible in any way?
(My phone isn’t available, and the google contacts back up messed up my contacts, as it’s known to do)
When I imported my contacts from Gmail, they got back but some of them were recorded as just names, including the contact I’m looking for, there was a sim card icon next to it, so it’s recorded in my sim. However, someone told me it’s due to that number being in a whattsgroup, so I might need to restore my whattsup data in order to view it. Others told me it might only got recorded as a name without a number, but I know it didn’t, cause that number kept calling not so far from two years. It’s indeed stored in that deleted data, I was wondering if I could restore all my call history from the sim card itself.
I have contacted the service provider company and they don’t keep more than 6 months of data. I also thought of hiring a professional hacker specialized in telecommunications so they can infiltrate the company’s database and restore all my automatically deleted data, but this is a bit far solution for now.
(Yeah and the Gmail account, No one remembers what it’s exactly was, so I think google customer support won’t be of aid (cause I thought of contacting them about the horrible backup issue, thought I could restore that contact properly. And the recovery email too)
I am very concerned someone has enough information they found in my wallet when my wallet was removed from my purse Friday night, to steal my identity. What should I do now?
I have 2 constructor functions and 2 additional function:
declare: d,d' = deck; c, c' = card
CardsInTheDeck(d'); (it returns "CardsInTheDeck(d)+1" when called with addCard(d,c) constructor obviously)
now, what happens when the function
addCardRandomly(d',c') is called with the
addCard(d,c) constructor? This is the semantic specification given by the book:
if random(CardsInTheDeck(d') = CardsInTheDeck(d')+1): then addCard(d',c'); else addCard(addCardRandomly(d, c'), c);
What I think it does is: Given that a deck of card can be treated as a queue, we can take the card c that our constructor has to insert inside the deck and: if the random gives back the first position of the queue then simply put the card on that position;
else swap that card with the card we just randomized and insert the cards over the card in that position once at time over the card we randomized itself. Eg:
Cards are 1 2 3 4 5 6 7 8
We have to insert 9
if random = 5
it becomes 1 2 3 4 9 5 6 7 8
(case where random = 9 omitted because trivial)
Is it correct? What makes this recursive specification so complex? How can i visualize and understand this kind of ideas generally? How can I explain this concept once the final solution is met? This looks so complex to me. Thanks!
So I’m abroad at the moment, yet I’ve just had a cash withdrawal made on my credit card from my country of origin, even though I’m not there and the card IS with me abroad.
I called the card issuer and they have cancelled the card and are sending me a replacement. They told me that this was definitely a bank machine withdrawal with a physical card so my card must have been copied at some point.
What’s odd is that it’s actually months since I last used this card in a physical transaction back in my home country so it’s odd that if it was copied all the way back then that it’s only being tested now.
Anyhow, it got me thinking, is it possible that the card wasn’t copied some months back but instead a copy card was compiled using data a scammer obtained about my card and its security codes via another source such as an online shop ? Is that technically possible or is there info in the card that is required that isn’t ever part of an online transaction?
I would like to ask a question about RFID USB authentization. I have industrial machine with pc with WinXp/10. There is a possibility to log into the visualisation of the machine control using USB. Principle is: On the pc HDD is a database with users, their passwords and (when created) USB ID (you plug usb in and when you create new user you can assign usb to it – usb stick is then formated and new UID is attached to the name in the database). Then you can plug USB to the machine and you are logged in.
What I would like to do is to connect RFID card reade to machine USB and then use rfid card or button (I will find the button number stored on it and assign it to the user usb UID in database) then when I get close with this button, reader sends string from button to the pc…. So is it possible to send it through reader to pc like UID – resp. is it possible to “upload” this string to the card reader UID? So pc would think there is a usb with UID of the user?
Thanks for your reply in advance.
Generally when one wants a to buy a SIM card, he’s generally asked his ID and the latter is photocopied in order to associate the related identity to the SIM, and then the asker is given the SIM and becomes its owner, but isn’t it a risk that the SIM shop worker could use that photocopy maliciously for other purposes, such as registering another SIM on that identity in order to commit a crime in name of that man? Isn’t there a law preventing this or some precautions that could be taken (or anything that we could ask to the SIM shop worker, such as giving us the photocopy in order to be sure)?
I’m a photographer and I’m in the process of making business cards for myself. On one side I have my personal info, and on the other I was going to use a photo that I took of somebody during one of my past gigs that showcases my style. However, a graphic designer friend of mine said that I can’t use a photo of someone on my card without their permission. Is this true?
Would it be possible to employ the GFX card instead of CPU, for work with threads, like it would be when the video or anything that would require high power of processing can be used?
I just bought this one for video rendering: PNY NVIDIA Quadro P4000, 8GB GDDR5.
Thanks for your answer, eventually to add it to the wishlist.