How to determine if user watched / “completed” the video?

I’m building a course website. It’s relatively simple and I need to track overall project progress only by tracking watched videos amount, e.g.

Course 1 5/12 watched 

The question is how do you understand that user watched the video?

Some options are: – user opened the video, e.g. clicked ”play” – user watched some % of the video (what would be the correct percent there?) – user watched the whole video

The point here that if user opened the video, watched for e.g. 10 seconds and jumped to next one, would that count as ”completed”?

For some users probably yes, because he explicitly skipped it or found not relevant. Other may return to it though so they might assume it’s not “completed” yet.

How do you to determine the reach of a Monster’s unarmed strikes?

This is inspired by the question “Does a Stone Giant get an attack of opportunity if I move only 5 feet away from it?”. The question ” Can a monster with no melee attack make an Opportunity Attack?” (as well as the Sage Advice Compendium) establishes that monsters do have unarmed strikes. I’m wondering then, how to determine the reach of this attack, if one exists at all.

Is there a rule somewhere that explains how the reach of an unarmed strike should be determined for creatures such as the Stone Giant whose only melee attack has a 15-foot reach? Or creatures like the Kraken who have multiple melee attacks with different reaches? The previously linked question also mentions the Flameskull which has no melee attacks whatsoever.

Is there any way, provided in the rules, to determine the reach of a given monster’s unarmed strikes?

What’s the correct way to determine turn order in this situation?

The situation:

Four orcs are spotted by the party, sitting around a campfire. Two more orcs are in a tent a couple meters away. The orcs do not notice them.

A Wizard casts invisibility on himself and goes very close to them them while the rest of the party waits close by, hidden behind a bush.

The wizard casts Thunderwave and as soon as he appears the rest of the party charge in.

Wich is the correct way to determine turn order in this situation?

Determine the number of self-crossings for an irregular orientation of an n-pointed star, whose vertices lie on the boundary of a circle

I need to create an algorithm that will output the number of self-crossings for an irregular orientation of an n-pointed star, whose vertices lie on the boundary of a circle. The sample input is as follows:

5 24.0 168.0 312.0 96.0 240.0 

Where the first integer is n (the number of vertices), proceeded with n lines, each describing the positions of the vertices, taken in order, which form the star. Each vertex is in a unique position on the boundary of the unit circle, specified in degrees from the normal axis. All degree measures will be in the range [0,360).

The sample output for the sample input would be:

5 crossings 

To tackle this problem, I was thinking of maybe separating the unit circle into quadrants and determine whether there are crossings depending on the positions of the vertices in their respective quadrants. However, I haven’t been able to think of a way to implement this.

I was wondering if anyone could provide perhaps a high-level idea or a push in the right direction which could help me think of an algorithm.

Thank you.

How to determine the base weapon damage for weapons that exceed the size table?

So I am playing a barbarian wielding a Butchering Axe. Last night it happened that by some glory magic my human (medium sized) barbarian was being enlarged letting his terrifying weapon become even more devastating.

So we checked the rulebook for what its new base damage would be. But unfortunately, the table ends at medium sized 2d6 becoming 3d6.

But since the Butchering Axe at medium size has already a weapon damage of 3d6, we tried to make out the pattern of the table which at that point was ambiguous (for us at least) we thought it either might be 4d6 following the increase from 2d6 to 3d6, or it might be 3d10 due to the steps at lower base damage weapons.

So the question is:

What is the weapons damage to be rolled here and by which pattern would this be identified for weapons exceeding the books printed table?

How do we determine whether a heuristic is better than another in A* search Algorithm?

I am trying to solve a Maze puzzle using the A* algorithm. I am trying to analyze the algorithm based on different applicable heuristics.

Currently, I explored Manhattan and Euclidean distances. Which other heuristics are available? How do we compare them? How do we know whether a heuristic is better than another?

ERROR: Could not reliably determine the server’s fully qualified domain name,

I’m facing a problem after using

$ sudo systemctl status apache2

apache2.service – The Apache HTTP Server Loaded: loaded (/lib/systemd/system/apache2.service; enabled; vendor preset: enabled) Drop-In: /lib/systemd/system/apache2.service.d └─apache2-systemd.conf Active: active (running) since Sun 2019-09-15 04:16:20 IST; 10s ago Process: 7043 ExecStop=/usr/sbin/apachectl stop (code=exited, status=0/SUCCESS) Process: 7048 ExecStart=/usr/sbin/apachectl start (code=exited, status=0/SUCCESS) Main PID: 7053 (apache2) Tasks: 6 (limit: 4559) CGroup: /system.slice/apache2.service ├─7053 /usr/sbin/apache2 -k start ├─7054 /usr/sbin/apache2 -k start ├─7055 /usr/sbin/apache2 -k start ├─7056 /usr/sbin/apache2 -k start ├─7057 /usr/sbin/apache2 -k start └─7058 /usr/sbin/apache2 -k start

Sep 15 04:16:20 deb-Inspiron-3542 systemd[1]: Starting The Apache HTTP Server… Sep 15 04:16:20 deb-Inspiron-3542 apachectl[7048]: AH00558: apache2: Could not reliably determine the server’s fully qualified domain name, us Sep 15 04:16:20 deb-Inspiron-3542 systemd[1]: Started The Apache HTTP Server.

What is the better way to overcome that?

Thanks Debajyoti

How does Ubuntu determine the date/time if no NTP server and a broken RTC clock?

I am trying to determine how Ubuntu 18.04 determines how to set the system clock for a computer that has a broken RTC clock and no access an NTP server and systemd-timesyncd disabled. Upon the boot the time is always 2018-01-28 10:58:48 EST. This appears very similar to

Prevent clock from advancing to a system time after Ubuntu Server build time

Where the time is reported as 2018-01-28 15:58. The only advice he got was to turn off timesyncd, which I already have disabled and also didn’t solve his problem.

Normally, an application starts, gets a GPS signal, sets the clock and starts running. But it doesn’t really need GPS to run. What it does need is for the clock to not go backwards in time. I thought I might be able to fix that if I knew how Ubuntu decides to set the time to 2018-01-28 10:58:48 EST.

One thing I did try was to enable systemd-timesyncd. While the computer isn’t normally connected to the Internet, as a maintenance procedure, I may connect it. Then I get the correct time and it touch(es) a file at /var/lib/private/systemd/timesync/clock. If I disconnect from the Internet and manually touch the file, the next boot will use that time. But even that approach, while better, still can set the clock backwards as it effectively remembers the last time the computer was connected to the Internet.

That aside, it seems a mystery that Ubuntu would use the same time at boot if it can’t determine a time and that time isn’t something like Jan 1 of some year. If I knew what Linux was doing, I might be able to craft a solution. So far, except for the URL above, what I find is a lot of “how to use NTP” and “Using NTP is a good idea” etc. I would if I could but no Internet except in maintenance mode.

ECDHE_RSA_WITH_AES_128_GCM_SHA256 – How to determine ECDHE Key Length?

Server: SSL Certificate, 2048-bit RSA Public Key, Signature Algorithm is sha256RSA

What am I missing here? !

  • I’ve scoured the RFC’s, and I have yet to find anything on how to determine the ECDHE key size (or any key exchange algorithm key size) in a TLS cipher suite. I need to confirm that ECDHE is at least 256 bits for compliance reasons.

  • In both RFC8422 and RFC4492 it’s emphasized that for ECDHE_RSA, the Certificate MUST contain an RSA public key… boom got it, now how do I determine the curve’s key length?

I don’t understand why in SSH, a key exchange algorithm like “ecdh-sha2-nistp384” has the curve size in it (which also determines the hash size), bit in a TLS cipher suite this is not the case.

  • The same thing goes for DHE_RSA_WITH_AES_128_GCM_SHA256 – How can I confirm that Diffie Hellman Ephermal is 2048 bits?

Is there other information I need to be looking at besides the Cert and the Cipher Suite? Do I need to dig into the code? Thanks in advance for any assistance with this!

How do I determine if a creature is too intelligent to be a controlled mount?

The section on mounted combat in the Player’s Handbook says:

While you’re mounted, you have two options. You can either control the mount or allow it to act independently. Intelligent creatures, such as dragons, act independently.

So, any mount can be allowed to act independently. However intelligent creatures always act independently.

However, I cannot find any rules outlining rules or guidelines for what qualifies a creature as intelligent (for this purpose or any other).

As a point of reference, the lowest intelligence score I can find for a dragon (white dragon wyrmling) is 5.

So, how do I determine if a mount is too intelligent to be controllable according to the rules? At what point or under what conditions is a creature considered intelligent?

If there are no rules, I’ll accept experience-backed guidance from people who have had to deal with this issue before and had a certain method work or not.