Computers
SUMMARY: Three computer operations can be enacted: Programming, Information Retrieval, and Hacking (altering or deleting information). Each operation requires a separate series of rolls. Programming is required to create Security or Hacking programs. Information Retrieval is just that, and Hacking is the deliberate modification deletion of information.
OPERATION | RELEVANT STATISTICS |
---|---|
Programming | Intelligence+Computer |
Information Retrieval | Intelligence+Computer |
Hacking | Intelligence+Hacking (must have at least 1 dot to attempt) |
Computer Costs by Type
SUMMARY: There are a number of types of Computers, which due to expandability and manufacturing processes, have been determined to have greater or lesser capacity for storage and programming.
COSTS:
- Laptop: $2,000
- Desktop: $1,000
- Minicomputer: $10,000
- Mainframe: $100,000
- Super Computer: $5,000,000
(Computers Augmented for Hacking cost 10 times the base cost.)
STATE-OF-THE-ART: State-of-the-Art advances cause computers to become outdated and obsolete very quickly. Each 6 IRL months, all computers will ‘degrade’ by one category, which reflects the advances in technology, not an actual change in the system itself. (Super -> Main -> Mini -> Desktop -> Laptop -> Useless)
Programming
Programming can be split up into four categories: General, Security, Cracking, and Virus programming. Programming rolls may be made after a span of hours of IC time spent OOC and on line. No more than five rolls may be made towards the creation of any program.
General Programming:
This task involves the routine day-to-day programming which produces anything from an on-line Cookbook to a multi-tier Database manager. General programming rolls may be made after every two IC hours. This type of programming requires a roll of Intelligence+Computer Skill. The difficulty and minimum number of successes required are as follows:
TASK | DIFFICULTY | SUCCESSES |
---|---|---|
Small Personal Program | 6 | 6 |
Large Personal Program | 7 | 6 |
Small Network Program | 7 | 8 |
Large Network Program | 8 | 8 |
Small Commercial Program | 8 | 10 |
Large Commercial Program | 9 | 10 |
Security Programming:
This task is used to create the protection software used to guard against incursion by either Hackers or Viruses. Each of these tasks are separate efforts, and must be performed as separate efforts. Security programming rolls may be made after every two IC hours. This type of programming requires a roll against a difficulty based on the type of system being protected, which also limits the maximum size of the Security programs. Security programming requires a roll of Intelligence+Computer Skill. To protect against Hacking, the programmer must have at least one dot in the Hacking Skill. The difficulty and maximum protection rating are as follows:
SYSTEM | DIFFICULTY | MAXIMUM |
---|---|---|
Laptop | 5 | 1 |
Desktop, Augmented Laptop | 6 | 2 |
Mini, Augmented Desktop | 7 | 4 |
Main, Augmented Mini | 8 | 6 |
Super, Augmented Main | 9 | 8 |
Augmented Super | 10 | 10 |
(Requirements for Augmenting systems for Security or Hacking purposes are detailed later.)
Cracking Programming:
This task is used to create cracking programs used to augment Hacking attempts (detailed later). Cracking programming rolls may be made after every two IC hours. This type of programming requires a roll against a difficulty based on the type of system being used, which also limits the maximum size of the Cracking programs. In order to successfully program the Cracking program, the programmer must have at least one dot in the Programming Skill. Cracking programming requires a roll of Intelligence+Hacking. The difficulty and maximum cracking rating are as follows:
SYSTEM | DIFFICULTY | MAXIMUM |
---|---|---|
Laptop | 5 | 2 |
Desktop, Augmented Laptop | 6 | 4 |
Mini, Augmented Desktop | 7 | 6 |
Main, Augmented Mini | 8 | 8 |
Super, Augmented Main | 9 | 9 |
Augmented Super | 10 | 10 |
(Requirements for Augmenting systems for Security or Hacking purposes are detailed later.)