How should I make this algorithm / What algorithms are avaiable for scheduling tasks

As part of a school assessment task, I am required to create a solution which incorporates a complex algorithm.

I have an idea for the algorithm and it goes as followed; A complex algorithm which takes tasks that are required to be completed for the week, and slots them into time slots for the week, considering their critical status, when it is due, duration of the tasks etc. It should also have an alarm system, reminders and also a progress tracker.

So I want to know how I could make an algorithm which decides where to slot tasks to be completed at a certain time.

Would be appreciated if you could help.

Thanks

What should happen if you cast enlarge on an explosive?

My thief player set a bomb and hid with a wizard player who was going to ignite it from afar with magic when the guards got close to it. While they waited the wizard got the bright idea to cast “enlarge” on it and turn 1lb of explosive into 8lb of explosive.

I winged it a bit and went with the explosion being twice as large (hitting everyone in 10 feet instead of 5) and dealing an extra 1d4 damage, though that’s supposed to be the effect if it’s a weapon.

Under RAW is there proper way to handle an ‘enlarged’ explosive?

What labels should be used when moves referencing playbook-specific features are taken as a move from another playbook?

A few playbook moves reference labels connected to playbook-specific features – for example the Protege’s Venting Frustration, allowing the character to roll the label their mentor denies to directly engage a threat while Angry.

When taken as a “take a move from another playbook” advance for a character who doesn’t have the playbook feature in question, how would you decide which label a character should use?

This is well into the realms of GM discretion and will often come down to the details of the specific character and move in question, but I’d like to know about people’s strategies and methods for making this sort of decision.

Should backup jobs be partitioned by type and applicable regulations of data?

Looking at how Microsoft categorizes data, customer data can be broken into a few different categories:

  • Customer Data
  • Customer Content
  • Personal Data

Should backup jobs be configured in a way to support special needs, such as

  • retention
  • deletion (partial or impartial for right to be forgotten)
  • access control (catalog, or metadata)

I migrated from Blogger to WordPress. Should I hotlink images from Blogger to the new WP site?

I have recently migrated from Blogger to WordPress. I was wondering whether instead of uploading existing images to the new WordPress site I should hotlink them from Blogger instead.

I do not worry about my WP host space, but I do not find my host very fast. So will hotlinking images from Blogger improve my site’s performance? What will be better as far as SEO is concerned?

P.O: I checked and found that hotlinking from Blogger to other sites is allowed according to the Google/blogger policy.

Should I have a FTC Disclosure (affiliates) for products that I don’t review or promote

Regarding the Federal Trade Commission (FTC) guidelines for affiliates.

Do they apply when I don’t review or promote/endorse a product? f.e. I have a page that mentions discount offers (affiliate links) for some products without sharing my opinion about them or giving recommendations, ranking, etc, do I have to include an affiliate disclosure in that case?

sorry for my English.

Should I generate a lot of random serial keys and pick one for each registration or generate 1 for each user?

I’m talking about Online activation. My current workflow is:

  1. User pays via paypal (without registration)
  2. Paypal performs a request to my API.
  3. My API returns a serial key to the user.
  4. Then the user is able to register using this serial key.

Is a “pay to register then use” and not a “register then pay to use”.

So the question is:

  • Should I generate (let’s say 100) keys and store them in DB then pick the first one available when someone pays via paypal? Isn’t this vulnerable to “guess” attacks?
  • Should I generate 1 random key each time a user pays via paypal? Can’t this approach generate 2 equal keys? I mean I have no info from the user except what paypal tells me so I should somehow use a random function OR loop the entire table comparing the serial keys.

How should one properly roleplay a Kender?

For my first campaign ever, we are playing 2E DragonLance. I, not content with my usual lot, chose to play a female kender handler. The first playsession went well, but reading up on kenders (from kencyclopedia, for example) I found out that I roleplayed my character very flatly and un-kender-like. I wasn’t curious, I was unreasonably cautious for a kender, I didn’t ‘handle’ much (though that might have been because we didn’t have much interesting stuff either), I didn’t get into trouble.

For the second session, I want to improve this, but I’m also wary of falling to the other side: playing a ‘realistic’ kender might mean ‘being a pain in the rear’. Many of us in the group are new to RPGs. I’m assuming (and could be wrong) that having to race to bail me out of troubles because I always go “Hey look, a big red dragon, cool! Let’s check it out!” would not be fun. Dying because they decided not to help me would not be fun either.

What would you recommend I do to play a better kender but not be a pain to my group?

When should refresh tokens be stored in a database?

I have a native Windows application programmed in .NET Core that needs to call a Web API. I intend to have the user enter credentials periodically, receiving a refresh token from my auth server for convenience. Encrypting the refresh token and saving it to my application’s database is looking like the strongest candidate for storing the refresh token securely, and allowing the finest user control (users can potentially access the application from different machines, making the Windows Vault seem less useful).

Are there established “best practices” when storing refresh tokens, or more directly, are there any contraindications raised by my use case? If so, are there other ways besides saving a cookie, which would couple the application not only to individual logins and machines, but also to browser-based infrastructure?