Have a Question?
< All Topics
Print

Computers

SUMMARY: Three computer operations can be enacted: Programming, Information Retrieval, and Hacking (altering or deleting information). Each operation requires a separate series of rolls. Programming is required to create Security or Hacking programs. Information Retrieval is just that, and Hacking is the deliberate modification deletion of information.

OPERATIONRELEVANT STATISTICS
ProgrammingIntelligence+Computer
Information RetrievalIntelligence+Computer
HackingIntelligence+Hacking (must have at least 1 dot to attempt)

Computer Costs by Type

SUMMARY: There are a number of types of Computers, which due to expandability and manufacturing processes, have been determined to have greater or lesser capacity for storage and programming. 

COSTS: 

  • Laptop: $2,000
  • Desktop: $1,000
  • Minicomputer: $10,000
  • Mainframe: $100,000
  • Super Computer: $5,000,000

(Computers Augmented for Hacking cost 10 times the base cost.)

STATE-OF-THE-ART: State-of-the-Art advances cause computers to become outdated and obsolete very quickly. Each 6 IRL months, all computers will ‘degrade’ by one category, which reflects the advances in technology, not an actual change in the system itself. (Super -> Main -> Mini -> Desktop -> Laptop -> Useless)

Programming

Programming can be split up into four categories: General, Security, Cracking, and Virus programming. Programming rolls may be made after a span of hours of IC time spent OOC and on line. No more than five rolls may be made towards the creation of any program.

General Programming: 

This task involves the routine day-to-day programming which produces anything from an on-line Cookbook to a multi-tier Database manager. General programming rolls may be made after every two IC hours. This type of programming requires a roll of Intelligence+Computer Skill. The difficulty and minimum number of successes required are as follows:

TASKDIFFICULTYSUCCESSES
Small Personal Program66
Large Personal Program76
Small Network Program78
Large Network Program88
Small Commercial Program810
Large Commercial Program910

Security Programming: 

This task is used to create the protection software used to guard against incursion by either Hackers or Viruses. Each of these tasks are separate efforts, and must be performed as separate efforts. Security programming rolls may be made after every two IC hours. This type of programming requires a roll against a difficulty based on the type of system being protected, which also limits the maximum size of the Security programs. Security programming requires a roll of Intelligence+Computer Skill. To protect against Hacking, the programmer must have at least one dot in the Hacking Skill. The difficulty and maximum protection rating are as follows:

SYSTEMDIFFICULTYMAXIMUM
Laptop51
Desktop, Augmented Laptop62
Mini, Augmented Desktop74
Main, Augmented Mini86
Super, Augmented Main98
Augmented Super 1010

(Requirements for Augmenting systems for Security or Hacking purposes are detailed later.)

Cracking Programming: 

This task is used to create cracking programs used to augment Hacking attempts (detailed later). Cracking programming rolls may be made after every two IC hours. This type of programming requires a roll against a difficulty based on the type of system being used, which also limits the maximum size of the Cracking programs. In order to successfully program the Cracking program, the programmer must have at least one dot in the Programming Skill. Cracking programming requires a roll of Intelligence+Hacking. The difficulty and maximum cracking rating are as follows:

SYSTEMDIFFICULTYMAXIMUM
Laptop52
Desktop, Augmented Laptop64
Mini, Augmented Desktop76
Main, Augmented Mini88
Super, Augmented Main99
Augmented Super 1010

(Requirements for Augmenting systems for Security or Hacking purposes are detailed later.)

Table of Contents