System Operators, Wiki Staff
869
edits
(Added a tips section to nanites. Added tips. Added information to nerve support. Added Joke. Added next half of Original Joke. Added a Joke in Tips.) |
m (Grammar) |
||
Line 662: | Line 662: | ||
|} | |} | ||
==Tips== | ==Tips== | ||
*Certain programs will take nanite volume even if | *Certain programs will take nanite volume even if it's activated or not. | ||
*Some programs need a trigger to work at all even if it is set to activated in the programming hub. | *Some programs need a trigger to work at all even if it is set to activated in the programming hub. For example, you will have to add Death sensors towards Defibrillation for the program to activate. | ||
*Nanites volume speed can be increased with programs but each come with their own cons | *Nanites volume speed can be increased with programs but each come with their own pros and cons. | ||
*If anyone is hit with | *If anyone is hit with an EMP with nanites inside them, the Nanite chamber in your workplace can remove the glitches if the person is in the chamber and another person works the console. | ||
*Sensor Programs are the key towards making programs work when you want them to or when it would only make sense. Don't let programs run all the time because it can drain volume | *Sensor Programs are the key towards making programs work when you want them to or when it would only make sense. Don't let programs run all the time because it can drain volume drastically. | ||
* | *The cloud allows you to have more deviation in your nanites. On cloud 1 you could have something for the public. On cloud 2 you could have nanites dedicated to security. | ||
* | * It's a good idea to keep tight wraps on who messes with the cloud. Make sure to shutdown <s>Mcgreytiderthe3rd</s> Unauthorized Crew from approaching it at all cost. If they were to upload something malicious it could mean a shuttle call. | ||
*Unless you are | *Unless you are an antagonist with hijack, or your captain has his eyes towards a special way to use the weaponized programs, it's best you stay far clear of them. These programs can cause harm and death to a lot of people at once. | ||
*The Nanite remote controller can be used to activate said nanites depending on the code. It can activate one person a group or local and relay. Also handy in testing out your nanites to activate them and make sure they work. | *The Nanite remote controller can be used to activate said nanites depending on the code. It can activate one person, a group or only local and relay. Also handy in testing out your nanites to activate them and make sure they work. | ||
* | *Suppression Programs are very useful to give to the public and give security a nanite remote controller. This can allow security to stop criminals without even laying a hand on them. If the criminal has the nanites that is. | ||
*Your nanite scanner is your best friend. It can help you see who has nanites, what the nanites do and how much volume said person has. This is key in rooting out glitches or subverted nanites. Also useful for checking if nanites | *Your nanite scanner is your best friend. It can help you see who has nanites, what the nanites do and how much volume said person has. This is key in rooting out glitches or subverted nanites. Also useful for checking if nanites are activate or not. | ||
* | * |