## Does it make any sense to take an aim action against an invisible target?

Checking over a battle with a caster versus an arcane archer/rogue. The caster, a bard, in this case, casts invisibility on themself. The archer still takes aim and hits with an advantage.

So my question is, does it make sense for the arcane archer/rogue to use their bonus action for aiming against an invisible target and still gain advantage to their initial attack roll?

Just seems a little funky to me that it was allowed because it doesn’t seem to make a whole lot of sense in the first place; at least not without a good perception roll…

## How does Monster Slayer’s Hunter’s Sense work with illusions?

Would he receive information about the creature’s vulnerabilities based on what it appears to be, would he receive no information about the creature as if it were hidden from Divination magic or would he just understand that this is an illusion based on "magically" part of the ability description?

(…you gain the ability to peer at a creature and magically discern how best to hurt it…)

## Does NordVPN over Cloudfare DNS make sense? (with extras)

So let’s say someone received a passive-aggressive notification and phone call from their ISP, and they decided to start locking down their network traffic, because like a dummy, they didn’t do that, before.

Thinking about such a "hypothetical" situation got me thinking about connection transparency, so I started testing.

Starting at the Computer level, NordVPN gets installed. But according to the experts who know a lot better, a VPN isn’t good enough.

So going to the router’s IPv4 network settings, the default DNS is changed from the ISPs default DNS (which would have been clearly listed there on the router page), over to Cloudfare’s 1.1.1.1 and 1.0.0.1.

But does that make sense to do that?

As I was thinking about this setup, I wondered if it made sense to set the VPN at the router level, too (supports OpenVPN), but figured it would be easier (for a novice who doesn’t want to mess up router settings) to install the VPN’s provided software, instead.

Extras

As I browsed through Firefox add-ons, I noticed some that provide proxy support.

As I tested this thing on ipleak.net, it displayed back a DNS from a Cloudfare server, it showed an IP address from the country where the NordVPN connection was being served from, and it recognized that a proxy was being used (which it threw in with "Your IP addresses").

And WebRTC has been disabled in "about:config" with "media.peerconnection.enabled = false". HTTPS Everywhere and Privacy Badger are enabled, Tracking Protection is set to Strict, Do Not Track is on; DRM, search suggestions, accessibility, studies and reports are all off.

But since ipleak.net was able to recognize everything I set up, I get the feeling I’m still doing it wrong, but since all the information displayed was wrong, I get the feeling I’m doing it right. Right or wrong?

Oh, and even with all that, would it make sense to employ the "internet villain" DoH too, or would that overwrite other settings I’ve already set up? Or would it do nothing, since Mozilla employs Cloudfare for its DoH, anyway?

Conclusion

This post may be too convoluted and mucked up compared to other questions on StackExchange, but I assume most of you know better than I do.

## What is a make sense (meaningful) example of language that an unrestricted grammar could generate?

I have learned that:

1. Unrestricted grammar is used to define (or describe) a formal language.
2. Unrestricted grammar is used to define recursively enumerable set [https://en.wikipedia.org/wiki/Recursively_enumerable_set][1].

I’d like to find a meaningful example for #1 case which is similar to below context sensitives grammar example to learn the purpose of unrestricted grammar. I could find a meaningful example for context sensitives grammar but I could not find a one for the unrestricted grammar yet. Could you help me?

Language for “Network racing game record” with below record instances:

Mr. Bean Male Player 1

Ms. Emma Female Player 2

Mr. Hải n/a Computer 3

Ms. Tú n/a Computer 4

Production rule:

S ⟶ Title Name TAB Sex UserType TAB Rank

Title WomanName ⟶ "Ms. " WomanName

Title ManName ⟶ "Mr. " ManName

WomanName TAB Sex "Player" ⟶ WomanName TAB "Female" "Player"

ManName TAB Sex "Player" ⟶ ManName TAB "Male" "Player"

Name TAB Sex "Computer" ⟶ Name TAB "n/a" "Computer"

Name ⟶ WomanName

Name ⟶ ManName

Sex ⟶ "Male"

Sex ⟶ "Female"

UserType ⟶ "Player"

UserType ⟶ "Computer"

Rank ⟶ "1"

Rank ⟶ "2"

Rank ⟶ "3"

Rank ⟶ "4"

WomanName ⟶ "Emma"

WomanName ⟶ "Tú"

ManName ⟶ "Bean"

ManName ⟶ "Hải"

TAB ⟶ "\t"

## Bounty Boards: How to make them fair and make sense

So I wanted to create a new adventure hook I could use over many campaigns and figured, “Hmm, most medieval settings would have bounty boards set up in towns, offer prices for people willing to go out and deal with local problems”. Sooo I got out my Monster Manuel and Dungeon Masters Guide, and 2 hours searching online, and here’s my actual problem.

When sorted via challenge rating (DMG pg 136) monsters have their value set via the 5 different currencies which you roll to the d100 to determine which currency you reward players with. However, lets use Goblins (MM pg 165) and Kenku (MM pg 194)as the example. Both are CR 1/4, which places them on the Individual Treasure: Challenge 0-4. However, common sense would tell me the following:

Assume a town has a problem with Kenku and Goblins.

Kenku are known for their greed and will do anything to possess pretty things. While many beg, others steal or commit other crimes to earn such possessions. When you defeat a Kenku, it is logical to find gems, coins and possibly art objects in some form in its home whatever place it may be.

Goblins on the other hand are also motivated by greed, however their tendencies towards forming large groups or smaller packs prevents any 1 goblin from achieving a large amount for himself. However they have a tendency of training animals such as rats and wolves (or sometimes a Worg).

While a Kenku or even a group of kenku can cause quite the problem in a town, if there is a goblin problem, the town will often rather have the goblins taken care of over the Kenku. As such, on a Bounty Board a pair of goblin ears as proof would be worth more than a Kenku Beak as proof, despite them both being the same CR and belong to the same treasure Table.

So how can I make the Bounty Board both fair to the CR and make sense with the D&D Lore?

## Do monsters with the “Telepathy” language automatically sense creatures in their telepathic radius?

Some monsters possess the special “Telepathy” language.

Telepathy Telepathy is a magical ability that allows a monster to communicate mentally with another creature within a specified range. The contacted creature doesn’t need to share a language with the monster to communicate in this way with it, but it must be able to understand at least one language. A creature without telepathy can receive and respond to telepathic messages but can’t initiate or terminate a telepathic conversation.

A telepathic monster doesn’t need to see a contacted creature and can end the telepathic contact at any time. The contact is broken as soon as the two creatures are no longer within range of each other or if the telepathic monster contacts a different creature within range. A telepathic monster can initiate or terminate a telepathic conversation without using an action, but while the monster is incapacitated, it can’t initiate telepathic contact, and any current contact is terminated. (MM p.9)

Does this ability allow them to sense the position of all creatures within the radius of their telepathy, given that “A telepathic monster doesn’t need to see a contacted creature”?

## Does it make sense that hadoop sqooping would need to sqoop most of the same data all of the time?

I’m a DBA supporting a database that has a large volume of call center data. The team I actually support is the owner of the database, which just imports new data daily, and mostly on this db for archival purposes.

Another team I don’t support directly, is a big data team, who have access to this database via a hadoop sqooping process. Lately, they’ve been complaining about how long it takes for their process to run. Their sqooping query boils down to a select statement that looks for all records on a table that were imported since 2019. This is millions of complex records. I’m considering some covering indexes that might help them, but I’m also questioning why they need to transfer all of these records three times a day, when it would only be a difference of ~ 10k new records a day.

Does it make sense that hadoop needs a full transfer of all of the data each time it runs? Maybe it does and I’m just ignorant to how hadoop and big data works, or maybe they aren’t bothering to target or batch what they are transferring because it’s easier to just grab everything.

## How do I sense when the player collides with a door in a GameController script?

I want to be able to sense when the player collides with a door from my GameController script. The player is a public GameObject and doors are tagged as such. Here is psuedo code for what I’m looking for:

public class GameController : MonoBehaviour {    public GameObject player;     void Update()    {       if(player collides with game object tagged "Door")          do something    } }

## In DnD, does the idea of a check with multiple DCs make sense or have a name?

For example, say a character is placed in a supernaturally hot environment, requiring a constitution save with the following result table:

16+: no effect 10-15: 1d6 fire damage ...9: 1d6 fire + 1 exhaustion point

This would have 2 DCs- 10 and 16. Is there a name or precedent for something like this? Or just “multiple DCs”?

## Making sense out of byte-order in text

I have stumbled about the way a text file is saved by the OS. I have typed:

printf "ab" | hexdump

and the output was:

6261

which are the letters in reversed order. My first intent was endianess, but this cannot be true, since at this level, such abstractions must be transparent to the programmer and user. Also endian would be:

$$ab \mapsto 6162 \mapsto 2616$$

So I wondered, why would someone save a file like that?

Greetings, Niclas