Guide to Nanites: Difference between revisions

4 bytes added ,  19:03, 6 January 2022
→‎Nanites: Editing a Joke to better fit this page/Fixed some grammar errors
m (Grammar)
(→‎Nanites: Editing a Joke to better fit this page/Fixed some grammar errors)
Line 6: Line 6:




Nanites are tiny nanomachines that live in a host's bloodstream, providing different functionalities depending on how they're programmed. The mob where the nanites reside is usually defined as their host..
Nanites are tiny nanomachines that live in a host's bloodstream, providing different functionalities depending on how they're programmed. The mob where the nanites reside is usually defined as their host...
=Nanites=
=Nanites=
NANOMACHINES, SON! THEY HARDEN IN RESPONSE TO PHYSCIAL TRAUMA!
DERMAL HARDENING, SON! THEY HARDEN IN RESPONSE TO PHYSCIAL TRAUMA!
==Implanting==
==Implanting==
[[File:Nanite_chamber.gif|thumb|Nanite Chamber]]
[[File:Nanite_chamber.gif|thumb|Nanite Chamber]]
Line 24: Line 24:
Nanite swarms can be set with a Cloud ID. If so, they will, every 30 seconds, copy the programming of the Cloud Backup with the same ID, if it has been set.
Nanite swarms can be set with a Cloud ID. If so, they will, every 30 seconds, copy the programming of the Cloud Backup with the same ID, if it has been set.
Cloud backups are controlled by Cloud Control Consoles. They can create new backups (with codes from 1 to 100), as well as upload programs from a disk into the selected backup.
Cloud backups are controlled by Cloud Control Consoles. They can create new backups (with codes from 1 to 100), as well as upload programs from a disk into the selected backup.
Cloud control consoles also serve as storage, meaning that if they're disabled they will no longer sync with connected nanites, and that if all cloud consoles are destroyed, all backups will be lost.
Cloud control consoles also serve as storage, meaning that if they're disabled, they will no longer sync with connected nanites, and that if all cloud consoles are destroyed, all backups will be lost.


Cloud synchronization has several benefits over direct chamber programming: it can update programs without a second person to operate the chamber, it will reset programming in case of tampering or data corruption, and can be updated remotely by a second person. Of course, the last part also makes it very risky, since anyone could upload malicious programs at any time if they have a console to do it with.
Cloud synchronization has several benefits over direct chamber programming: it can update programs without a second person to operate the chamber, it will reset programming in case of tampering or data corruption and can be updated remotely by a second person. Of course, the last part also makes it very risky, since anyone could upload malicious programs at any time if they have a console to do it with.
=Nanite Programs =
=Nanite Programs =
Nanite programs determine what nanites do inside the host. They have different categories, and range from helpful to deadly.
Nanite programs determine what nanites do inside the host. They have different categories and range from helpful to deadly.
==Obtaining programs==
==Obtaining programs==
Programs are unlocked through techweb research. Once unlocked, they can be downloaded into Nanite Program Disks at any Nanite Program Hub.
Programs are unlocked through techweb research. Once unlocked, they can be downloaded into Nanite Program Disks at any Nanite Program Hub.
Line 69: Line 69:
Nanites are split in several categories.
Nanites are split in several categories.
===Utility Programs===
===Utility Programs===
Programs that interact with the nanites themselves, or have general utility purposes.
Programs that interact with the nanites themselves or have general utility purposes.
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
|-
|-
Line 331: Line 331:
|}
|}
=== Glitch Programs===
=== Glitch Programs===
Defective programs caused by data corruption, and not otherwise obtainable. Generally range from mildly to moderately dangerous. Can stack.
Defective programs caused by data corruption, and not otherwise obtainable. Generally, range from mildly to moderately dangerous. Can stack.
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
|-
|-
255

edits