## Table Columns with Complex Structures (fields under it, that can have fields underneath too-like nested ones)in a few of its col

This is for Web Application. I am looking for tabular UIs that doesn’t have nesting but is able to show a child row under a parent row and those children can have further children and so on. My limitation is not to use nesting. Any leads or ideas around it?

## Minimise the difference under given constraints

Given $$M$$ arrays, pick one element from each array so that, the difference between the maximum and minimum of the resulting array is the smallest possible. Provide an efficient algorithm for finding such a minimum difference.

Constraints:

The total number of elements in $$M$$ arrays <=$$10^5$$

$$M$$<=$$10^5$$

Time limit: 1secs

Example: Let $$M$$ arrays be,( $$M=3$$ in the following)

$$10,16,21$$

$$15,28$$

$$18,30$$

The optimum way to pick elements is 16 from the first set, 15 from the second set, 18 from 3rd set.Hence the answer is $$18-15=3$$

## What are the requirements for a superset of P to be closed under karp reductions?

So today in our exercise session on complexity theory we discussed that P, NP, and BPP are closed under karp reduction. We also figured that the proofs could likely be expanded to straight generalizations of these three “classes of classes” (nondeterministic, deterministic, probabilistic) like EXPTIME.

This, to us, begged the question:

Suppose you have a class of languages $$C\supseteq P$$, what are neccessary (and sufficient?) conditions for $$C$$ to be closed under karp reduction?

Terminology:

• A language $$A$$ is karp-reducible to another language $$B$$, written $$A\leq_m B$$ iff $$\exists$$deterministic poly-time turing machine $$K_{A,B}:\forall x\in\{0,1\}^*: x\in A\iff K_{A,B}(x)\in B$$ holds.
• A class $$C$$ is closed under $$\leq_m$$ iff $$\forall B,A\subseteq \{0,1\}^*: B\in C\land A\leq_m B\implies A\in C$$ holds.

## I can pay by my credit card under fake name: who’s responsible to check?

I am customer of a large European bank, but I have found the following happening consistently with multiple past banks.

Basically, I have always been able to pay using my legitimate card(s), credit or debit, under a fake name.

When you are prompted online for your card information, you will normally select

• Circuit (Visa, Mastercard, etc, sometimes optional as the merchant will deduce from the first digits)
• PAN
• Expiration date
• CVV2/security code
• Card holder

Well, I found I can consistently use a fake name when other fields are consistent. I can easily get my payment approved. Often I am redirect to secondary verification (OTP) and pass that brilliantly.

I am writing here because this makes me a bit confused. Often merchants say “Please type your name as displayed on the card” so that you think they (someone) will do a strong check on the record and refuse the transaction if you omit/enter a second name inconsistently or use apostrophes/accents inconsistently, exactly like what happens often in airline travel when boarding card doesn’t match passenger name as displayed on passport/ID. To make a counterexample…

But here I am speaking about completely different names. The only time I was called by my bank “Sir, we are detecting a number of attempted charges” I was using my real name with a brand new card (you know… you have to move all your online subscriptions). I was never called, no card ever blocked for “Sir, someone could have stolen your card details”.

Question time: in the technical world of credit card payment, 1) what is the importance of the card holder name if it’s not consistently checked? 2) who should be responsible for checking? bank, merchant or transaction processor?

Note: I know very well that just using a pseudonym does not make me anonymous. Of course the transaction can be tracked back to an individual, but that requires a lot of juridical power (and legitimate interest, speaking about Europe).

## Can you cast Animate Dead on someone under effect of Feign Death?

The Feign Death spell (PHB, p. 240) says:

For the spell’s duration, or until you use an action to touch the target and dismiss the spell, the target appears dead to all outward inspection and to spells used to determine the target’s status.

The Animate Dead spell, on the other hand, says:

This spell creates an undead servant. Choose a pile of bones or a corpse of a Medium or Small humanoid within range. Your spell imbues the target with a foul mimicry of life, raising it as an undead creature. The target becomes a skeleton if you chose bones or a zombie if you chose a corpse (the DM has the creature’s game statistics).

Feign Death has this strange clause that all spells used to detect the target status register it as being dead. Animate Dead takes a corpse of a dead creature and create a zombie out of it.

On one hand, a Feigned creature isn’t a corpse, so it isn’t a valid target for Animate Dead. On the other hand, if Animate Dead fails, then the creature isn’t a corpse, but that would violate the clause from Feign Death that says the target appears dead to spells used to determine the target status and now my head is hurting and I don’t understand anything anymore.

What happens if you cast Animate Dead on a creature currently under effect of Feign Death to determine if it is dead?

Would you end up with some weird living zombie that is undead but not really?

## Domain shadowingish – malicious subdomains under the guise of legit domains

I am trying to find a list of websites that let you create your own malicious subdomains under the guise of a legit domain and cert. We are performing some remediation automation for blacklisting URLs and this would come in handy for whitelisting. Additionally I was wondering if there is a proper name for this kind of phishing/impersonation attack? It is similar to domain shadowing, but there is no compromise taking place of a registrar account.

Two examples that come to mind are Azure blob storage and personal sharepoint sites. Both have legitimate primary domains and certs registered to Microsoft.

## Using Arcane Eye Under Water

I have a player who wants to know if they could use Arcane Eye above and below water (or any other liquids). I initially said yes, however, after reading the spell it says,

“A solid barrier blocks the eye’s Movement”

and I began second guessing my decision. In the context of this question and the 5e rules how “solid” is water and would it prevent Arcane Eye from entering or operating in it?

## Is using typical memory used when working under windows environment a good knowledge of needed memory for a new computer?

Let s suppose I want to buy a new computer. My reasonning for the amount of ram is the following.

Is it correct ?

I look under windows environment how much memory I use when a large amount of applications that I typically use are simultaneously active. This gives me the memory that I need for the next computer.

Not more is needed.

## When performing an investigation check do you activate traps if you roll under the DC?

If you are for instance checking out the floor looking for pressure plates and roll low, would you activate the trap or would the DM just tell you that you found no traps?

## Can a Hunter Ranger under the effects of the Shapechange spell use Whirlwind Attack with a Monster’s attack?

The Hunter Ranger’s Whirlwind Attack feature states:

You can use your action to make a melee attack against any number of creatures within 5 feet of you, with a separate attack roll for each target.

I’m wondering whether you could use the shapechange spell in conjunction with this feature, the spell states:

[…] You retain the benefit of any features from your class, race, or other source and can use them, provided that your new form is physically capable of doing so […]

Does this mean that a Ranger who is transformed into, say, a Bulette could use their Bite attack with Whirlwind Attack?