Can you cast magic stone on 3 pebbles as a bonus action, throw a stone as a main action. Then ON YOUR NEXT TURN, throw the 2 remaining pebbles?

Can you cast magic stone on 3 pebbles as a bonus action, throw a stone as a main action. Then ON YOUR NEXT TURN, throw the 2 remaining pebbles? Like 1st thrown as “main action” & 2nd thrown as your “bonus action”, inside the “two weapon fighting rules”, from PHB pg 195 below


When you take the Attack action and attack with a light melee weapon that
you’re holding in one hand, you can use a bonus action to attack with a different light melee weapon that you’re holding in the other hand. You don’t add your ability modifier to the damage of the bonus attack, unless that modifier is negative. If either weapon has the thrown property, you can throw the weapon, instead of making a melee attack with it.

Seeing as there is no, individual, entry for “pebble” and/or “stone” (making it an improvised melee weapon?), but also seeing as the attacker is considered “proficient” (it doesn’t state your at any disadvantage with the stones) with the magic stone & its 100% considered “thrown” (or used as sling ammo), could it ALSO be assumed to be “light” (like a dagger, light hammer or hand ax is?).

Seeing the limited use of bonus action’s spells when attacking ranged as a druid

Magic stone, Shillelagh & Healing word, as options. None are “direct attacks”.

Especially before level 5, when produce flame & create bonfire out pace magic stone as ranged attack options, being able to “dual wield” 2 magic stones would be a doubling of action economy & damage output at range, mainly for druids levels 1 to 4

Side note I have melee handled with dual wielding a shillelagh’ed club with an off hand scimitar, its pre-level 5 ranged options I hope to expand

Can you use your off-handed weapon for your main attack action?

My friend is 2 weapon fighting a flesh golem and has one sword that does lightning and one sword that does fire. His right hand holds the lightning sword and his left hand holds the fire sword.

My friend wants to attack with his left hand because lightning heals the golem, but the DM says because his left hand is his left cand he can’t use it as his “main” hand and only attack with it. Is this rules as written/intended?

What are the main differences between a covert timing channel and a covert storage channel?

I am trying to find the differences between a covert timing channel and a covert storage channel in terms of detectability, performance, features, and any other advantages and disadvantages.

Is there any resource that directly compares the advantages and disadvantages of the two attacks?

What is the main concept of using lexical,linguistic, semantic or syntactic approach in NLP for cyberbullying

Am really in need of some explanation, am working on a nlp cyberbullying detection tool which i will deploy to the web using django framework, however, am stuck on some idea, can someone explain to me….What is the main concept of using lexical,linguistic, semantic or syntactic approach in (NLP) and how is applied in cyberbullying or what are the step, i know POS-tag is way of grouping word and look for dependency in other word, my idea of pos-tag is a synonym of semantic because pos-tagging is a process linking words to it root and representation word in a understandable context correct me if wrong.

I read an article where a paper tackled a project using predictive analysis approach with feature extraction techniques, navie baye for classification and to train the model, in the discussion they also spoke on how other team used Semantics approach to classifier cyber bullying . I know of data cleaning, tokenisation stemming and most of feature extraction model, however, am stuck on the problem of approach which is what is the relevant on lexical, semantic or syntactic and how are they been approached.

How detectable is malicious code run by programs that download and then install the main file?

There are many programs (free or otherwise) where the user is asked to download a small installer file, which may display the EULA to the user or do some other user registration, which then downloads the latest version of the main program (much larger, and often consists of many files) to install the software.

There are many instances where this is legitimate, and it seems to be popular with mainstream software packages like ADOBE or Microsoft products, and it makes sense to use this approach to handle the installation of software, but if I download a 15MB installer program for some audio processing program and scan it on VirusTotal and it says nothing is detected, but then when I run it the program says it needs to download 150MB, it completely avoids the detection, doesn’t it?

The downloaded software may even be different each time, and likely will be because of version changes and updates.

So I should then scan the newly downloaded files before running them, shouldn’t I?

Is it common for programs to be set up so that they download a malicious file from a server and then run it within its own program? And does that get detected as malicious?

Aesthetic URL problem: Website from server02 should look like its on a subdirectory of the main site from server01 is on server01 with IP address is on server02 with IP address

I actually do not want the subdomain abc. Ideally I want it at I want to have a more cohesive website for usability and aesthetics. For non-technical people, having the content in a sub-directory feels that you are still on the same site compared to going to a sub-domain.

My problem is that the code for the subdomain site (Site2) is on server02 with a different IP. I cannot use just 1 server for the 2 sites: Site1 is using Apache, MySql, and PHP for PHP websites and static websites. Site 2 is a webapp that uses nginx, ruby and postgresql. Maintenance wise, IMHO, it is easiest to have site02 on a separate server. But as I said, it would be great if it can be visited by the end-user in a sub-directory of the main domain.

Is there a a way for me to achieve this?

Calculate the number of blocks and size of main memory in words for fully-associative cache

In order to organise the cache, main memory is divided up into blocks, and each block contains a certain number of words. The cache is divided up into lines; a block can fit in one line. A cache line has control and tag bits, allowing the cache to be searched for the required word. Cache A is the single cache for a small main memory. Cache A has been organised in a particular way, giving the following control and tag bits for cache A lines: Tag (10-bits) Offset (7-bits)

How many blocks are there in the main memory that cache A is supporting?

What is the size of main memory in words?

How can I fix an Inset plot to the top right corner of the main plot?

I want to export multiple plots and always have a small picture of another plot in the top right corner (as there is no data of the main plot in this region). However, it would be nice if I didn’t have to set the position argument in Inset[] manually, as my y-values change for every plot. Thank you for any help! Below is an example of my code with the export part cut out off the For-loop. The issue is in the last line of the code, where I try to determine the position of the Inset-plot depending on the y-values, which is not working very well.

For[zz = 1, zz <= 4, zz++,  LargeRangePlotLargeM =    ListPlot[{ DeltaDeltaPPS2to5LargeM[[zz]],       DeltaDeltaRS2to5LargeM[[zz]], DeltaDeltaPRS2to5LargeM[[zz]],      DeltaDeltaGHZ2to5LargeM[[zz]]}, PlotMarkers -> "OpenMarkers",     PlotRange -> All];  LargeRangePlotWithLargeM =    ListPlot[{DeltaDeltaPPS2to5[[zz]], DeltaDeltaRS2to5[[zz]],      DeltaDeltaPRS2to5[[zz]], DeltaDeltaGHZ2to5[[zz]]},     PlotLegends -> {"PPS", "RS", "PRS",  "GHZ"},      AxesLabel -> {"M", "FSA"},     PlotLabel -> StringForm["N = ``", zz + 1],     PlotMarkers -> "OpenMarkers",  PlotRange -> All,     Epilog ->      Inset[LargeRangePlotLargeM, {750,        2 * DeltaDeltaGHZ2to5[[1]][[2]][[2]]}]]; ] 

Simpler code with the same question might look like this:

p2 = Plot[Sin[x], {x, 0, \[Pi]}]; pcombined =   Plot[Sin[x], {x, 0, 2 \[Pi]}, Epilog -> Inset[p2, {5, 0.5}]] 

How do I now define the position argument inside Inset in a way that it moves the plot to the top right corner without having to choose plot specific values manually?