Guide to Nanites: Difference between revisions

Jump to navigation Jump to search
124 bytes removed ,  15:20, 26 October 2023
Changed nanite consumption amounts and removed mind control nanites, fake death nanites, and paralysis nanites as per was changed PR #17858
m (Added some clarification to the Neural Reimaging and Selective Blood Purification nanite descriptions.)
(Changed nanite consumption amounts and removed mind control nanites, fake death nanites, and paralysis nanites as per was changed PR #17858)
 
(2 intermediate revisions by one other user not shown)
Line 87: Line 87:
|Smart
|Smart
|Toxin Buildup
|Toxin Buildup
|-
!Distributed Computing
|The nanites aid the research servers by performing a portion of its calculations, increasing research point generation.
|0.1
| --
| --
|Smart
|Toxin Buildup
|-
!Neural Network
|The nanites link the host's brains together forming a neural research network, that becomes more efficient with the amount of total hosts.
|0.2
| --
| --
|Harmonic
|Neuro-Necrosis
|-
|-
!Viral Replica
!Viral Replica
Line 251: Line 267:
!Accelerated Regeneration
!Accelerated Regeneration
|The nanites boost the host's natural regeneration, increasing their healing speed. <i>Does not consume nanites while the host is undamaged.</i>
|The nanites boost the host's natural regeneration, increasing their healing speed. <i>Does not consume nanites while the host is undamaged.</i>
|2.5
|1.5
| --
| --
| --
| --
Line 259: Line 275:
!Temperature Adjustment
!Temperature Adjustment
|The nanites adjust the host's internal temperature to an ideal level. Does not consume nanites while the host is at an ideal temperature.
|The nanites adjust the host's internal temperature to an ideal level. Does not consume nanites while the host is at an ideal temperature.
|3.5
|2.5
| --
| --
| --
| --
Line 291: Line 307:
! Mechanical Repair
! Mechanical Repair
|The nanites fix damage in the host's mechanical limbs. Does not consume nanites if the limbs are undamaged.
|The nanites fix damage in the host's mechanical limbs. Does not consume nanites if the limbs are undamaged.
|0.5
|1
| --
| --
| --
| --
| Basic
|Basic
|Necrosis
|Necrosis
|-
|-
Line 303: Line 319:
| --
| --
|Harmonic
|Harmonic
| Hypoxemia, Necrosis
|Hypoxemia, Necrosis
|-
|-
!Bio-Reconstruction
!Bio-Reconstruction
| The nanites manually repair and replace organic cells, acting much faster than normal regeneration. However, this program cannot detect the difference between harmed and unharmed, causing it to consume nanites even if it has no effect.
|The nanites manually repair and replace organic cells, acting much faster than normal regeneration. However, this program cannot detect the difference between harmed and unharmed, causing it to consume nanites even if it has no effect.
|5.5
|7
| --
| --
| --
| --
| Harmonic
|Harmonic
| Hypoxemia, Necrosis
|Hypoxemia, Necrosis
|-
|-
!Neural Reimaging
!Neural Reimaging
Line 319: Line 335:
| --
| --
|Harmonic
|Harmonic
| Neuro-Necrosis, Brain Misfire
|Neuro-Necrosis, Brain Misfire
|-
|-
!Defibrillation
!Defibrillation
Line 326: Line 342:
|25
|25
|12s
|12s
| Harmonic
|Harmonic
|Shocking
|Shocking
|-
|-
|}
|}
=== Glitch Programs===
===Glitch Programs===
Defective programs caused by data corruption, and not otherwise obtainable. Generally, range from mildly to moderately dangerous. Can stack.
Defective programs caused by data corruption, and not otherwise obtainable. Generally, range from mildly to moderately dangerous. Can stack.
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
|-
|-
! scope="col" width="10%" |Program
! scope="col" width="10%" |Program
! scope="col" class="unsortable" | Effect
! scope="col" class="unsortable" |Effect
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" | Trigger Cost
! scope="col" width="5%" |Trigger Cost
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="7%" |Required Techweb
! scope="col" width="7%" |Required Techweb
Line 362: Line 378:
|0.25
|0.25
| --
| --
| --
| --
| --
| --
|Glitch
|Glitch
|-
|-
! Hypoxemia
!Hypoxemia
| The nanites prevent the host's blood from absorbing oxygen efficiently.
|The nanites prevent the host's blood from absorbing oxygen efficiently.
|0.75
|0.75
| --
| --
Line 376: Line 392:
!Neuro-Necrosis
!Neuro-Necrosis
|The nanites seek and attack brain cells, causing extensive neural damage to the host.
|The nanites seek and attack brain cells, causing extensive neural damage to the host.
| 0.75
|0.75
| --
| --
| --
| --
Line 382: Line 398:
|Necrosis
|Necrosis
|-
|-
! Brain Misfire
!Brain Misfire
|The nanites interfere with neural pathways, causing minor psychological disturbances.
|The nanites interfere with neural pathways, causing minor psychological disturbances.
|0.5
|0.5
Line 396: Line 412:
| --
| --
| --
| --
| Necrosis
|Necrosis
|-
|-
!Nerve Decay
!Nerve Decay
Line 404: Line 420:
| --
| --
| --
| --
| Necrosis
|Necrosis
|}
|}
===Weaponized Programs===
===Weaponized Programs===
Line 413: Line 429:
! scope="col" class="unsortable" |Effect
! scope="col" class="unsortable" |Effect
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" |Trigger Cost
! scope="col" width="5%" |Trigger Cost  
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="7%" |Required Techweb
! scope="col" width="7%" |Required Techweb
! scope="col" class="unsortable" width="8%" |Corruptions
! scope="col" class="unsortable" width="8%" |Corruptions
|-
|-
! Cellular Breakdown
!Cellular Breakdown
|The nanites destroy cellular structures in the host's body, causing brute damage.
|The nanites destroy cellular structures in the host's body, causing brute damage.
|1.5
|1.5
| --
| --
| --
| --
|Biological
|Biological
|Necrosis
|Necrosis
Line 432: Line 448:
| --
| --
|Biological
|Biological
| Toxin Buildup
|Toxin Buildup
|-
|-
!Memory Leak
!Memory Leak  
|This program invades the memory space used by other programs, causing frequent corruptions and errors.
|This program invades the memory space used by other programs, causing frequent corruptions and errors.
| 0
|0
| --
| --
| --
| --
Line 443: Line 459:
|-
|-
!Aggressive Replication
!Aggressive Replication
| Nanites will consume organic matter to improve their replication rate, damaging the host.
|Nanites will consume organic matter to improve their replication rate, damaging the host.
| -1
| -1
| --
| --
Line 451: Line 467:
|-
|-
!Meltdown
!Meltdown
| Causes an internal meltdown inside the nanites, causing internal burns inside the host as well as rapidly destroying the nanite population. Sets the nanites' safety threshold to 0 when activated.
|Causes an internal meltdown inside the nanites, causing internal burns inside the host as well as rapidly destroying the nanite population. Sets the nanites' safety threshold to 0 when activated.
|10
|10
| --
| --
Line 460: Line 476:
!Chain Detonation
!Chain Detonation
|Detonates all the nanites inside the host in a chain reaction when triggered.
|Detonates all the nanites inside the host in a chain reaction when triggered.
| 0
|0
|25
| 25
|10s
|10s
|Military
|Military
Line 468: Line 484:
!Heart-Stopper
!Heart-Stopper
|Stops the host's heart when triggered; restarts it if triggered again.
|Stops the host's heart when triggered; restarts it if triggered again.
| 0
|0
|12
| 12
|1s
|1s
| Military
|Military
|Nerve Decay
|Nerve Decay
|-
|-
!Cryogenic Treatment
!Cryogenic Treatment
| The nanites rapidly sink heat through the host's skin, lowering their temperature.
|The nanites rapidly sink heat through the host's skin, lowering their temperature.
| 1
|1
| --
| --
| --
| --
Line 483: Line 499:
|-
|-
!Sub-Dermal Combustion
!Sub-Dermal Combustion
| The nanites cause buildup of flammable fluids under the host's skin, then ignites them.
|The nanites cause buildup of flammable fluids under the host's skin, then ignites them.
|4
| --
| --
| Military
| Dermalysis, Cryogenic Treatment
|-
!Mind Control
|The nanites imprint an absolute directive onto the host's brain while they're active.
|3
|3
| --
| --
| --
| --
| Hazard
|Military
|Neuro-Necrosis, Brain Misfire
|Dermalysis, Cryogenic Treatment
|-
|-
|}
|}
=== Suppression Programs===
===Suppression Programs===
Programs with the goal of acting as a deterrent against the host. Generally nonlethal.
Programs with the goal of acting as a deterrent against the host. Generally nonlethal.
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
Line 506: Line 514:
! scope="col" class="unsortable" |Effect
! scope="col" class="unsortable" |Effect
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" | Trigger Cost
! scope="col" width="5%" |Trigger Cost
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="7%" |Required Techweb
! scope="col" width="7%" |Required Techweb
Line 512: Line 520:
|-
|-
!Electric Shock
!Electric Shock
| The nanites shock the host when triggered. Destroys a large amount of nanites!
|The nanites shock the host when triggered. Destroys a large amount of nanites!
| --
| --
|10
|10
Line 519: Line 527:
|Toxin Buildup
|Toxin Buildup
|-
|-
! Neural Shock
!Neural Shock
|The nanites pulse the host's nerves when triggered, inapacitating them for a short period.
|The nanites pulse the host's nerves when triggered, inapacitating them for a short period.
| --
| --
|4
|4
|30s
|30s
Line 534: Line 542:
|Synaptic
|Synaptic
|Neuro-Necrosis, Brain Misfire
|Neuro-Necrosis, Brain Misfire
|-
!Paralysis
|The nanites actively suppress nervous pulses, effectively paralyzing the host.
|3
| --
|  --
|Neural
|Nerve Decay
|-
!Death Simulation
|The nanites induce a death-like coma into the host, able to fool most medical scans.
|3.5
| --
|  --
|Harmonic
|Necrosis, Nerve Decay, Neuro-Necrosis
|-
|-
!Pacification
!Pacification
Line 556: Line 548:
| --
| --
| --
| --
| Synaptic
|Synaptic
|Neuro-Necrosis, Brain Misfire
|Neuro-Necrosis, Brain Misfire
|-
|-
Line 565: Line 557:
| --
| --
|Synaptic
|Synaptic
| Nerve Decay
|Nerve Decay
|-
|-
!Mute
!Mute
Line 571: Line 563:
|0.75
|0.75
| --
| --
| --
| --
|Synaptic
|Synaptic
|Neuro-Necrosis, Brain Misfire
|Neuro-Necrosis, Brain Misfire
Line 579: Line 571:
| --
| --
|3
|3
| 2s
|2s
|Synaptic
|Synaptic
|Neuro-Necrosis, Brain Misfire
|Neuro-Necrosis, Brain Misfire
|-
|-
!Skull Echo
!Skull Echo  
| The nanites echo a synthesized message inside the host's skull.
|The nanites echo a synthesized message inside the host's skull.
| --
| --
|1
|1
Line 600: Line 592:
|-
|-
|}
|}
===Sensor Programs ===
===Sensor Programs===
Programs that will self-pulse a given code when their condition is met.
Programs that will self-pulse a given code when their condition is met.
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
Line 607: Line 599:
! scope="col" class="unsortable" |Effect
! scope="col" class="unsortable" |Effect
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" |Trigger Cost
! scope="col" width="5%" |Trigger Cost  
! scope="col" width="5%" | Trigger Cooldown
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="7%" |Required Techweb
! scope="col" width="7%" |Required Techweb
! scope="col" class="unsortable" width="8%" |Corruptions
! scope="col" class="unsortable" width="8%" |Corruptions
Line 617: Line 609:
| --
| --
| --
| --
| Biological
|Biological
| Glitch
|Glitch
|-
|-
! Critical Health Sensor
!Critical Health Sensor
|The nanites receive a signal when the host first reaches critical health.
|The nanites receive a signal when the host first reaches critical health.
|0
|0
| --
| --
| --
| --
| Biological
|Biological
|Glitch
|Glitch
|-
|-
!Death Sensor
!Death Sensor
| The nanites receive a signal when they detect the host is dead.
|The nanites receive a signal when they detect the host is dead.
|0
|0
| --
| --
Line 637: Line 629:
|-
|-
!Nanite Volume Sensor
!Nanite Volume Sensor
|The nanites receive a signal when the nanite supply is above/below a certain percentage, with the safety threshold being 0%. If safety threshold is higher, it will skew the percentage. For example, with threshold 50, 100 volume will count as 50 available volume, which means 10% instead of 20%, and the full 500 volume will count as 90%.
|The nanites receive a signal when the nanite supply is above/below a certain percentage, with the safety threshold being 0%. If safety threshold is higher, it will skew the percentage. For example, with threshold 50, 100 volume will count as 50 available volume, which means 10% instead of 20%, and the full 500 volume will count as 90%.  
|0
|0
| --
| --
| --
| --
| Basic
|Basic
|Glitch
|Glitch
|-
|-
!Damage Sensor
!Damage Sensor
| The nanites receive a signal when a host's specific damage type is above/below a target value.
|The nanites receive a signal when a host's specific damage type is above/below a target value.
|0
|0
| --
| --
Line 654: Line 646:
!Voice Sensor
!Voice Sensor
|Sends a signal when the nanites hear a determined word or sentence.
|Sends a signal when the nanites hear a determined word or sentence.
| 0
|0
| --
| --
| --
| --
Line 668: Line 660:
*Sensor Programs are the key towards making programs work when you want them to or when it would only make sense. Don't let programs run all the time because it can drain volume drastically.
*Sensor Programs are the key towards making programs work when you want them to or when it would only make sense. Don't let programs run all the time because it can drain volume drastically.
*The cloud allows you to have more deviation in your nanites. On cloud 1 you could have something for the public. On cloud 2 you could have nanites dedicated to security.
*The cloud allows you to have more deviation in your nanites. On cloud 1 you could have something for the public. On cloud 2 you could have nanites dedicated to security.
* It's a good idea to keep tight wraps on who messes with the cloud. Make sure to shutdown <s>Mcgreytiderthe3rd</s> Unauthorized Crew from approaching it at all cost. If they were to upload something malicious it could mean a shuttle call.
*It's a good idea to keep tight wraps on who messes with the cloud. Make sure to shutdown <s>Mcgreytiderthe3rd</s> Unauthorized Crew from approaching it at all cost. If they were to upload something malicious it could mean a shuttle call.
*Unless you are an antagonist with hijack, or your captain has his eyes towards a special way to use the weaponized programs, it's best you stay far clear of them. These programs can cause harm and death to a lot of people at once.
*Unless you are an antagonist with hijack, or your captain has his eyes towards a special way to use the weaponized programs, it's best you stay far clear of them. These programs can cause harm and death to a lot of people at once.
*The Nanite remote controller can be used to activate said nanites depending on the code. It can activate one person, a group or only local and relay. Also handy in testing out your nanites to activate them and make sure they work.
*The Nanite remote controller can be used to activate said nanites depending on the code. It can activate one person, a group or only local and relay. Also handy in testing out your nanites to activate them and make sure they work.
2

edits

Navigation menu