"Modular Computer" refers to those electrical devices designed with ease of assembly and upgrading through the use of special "modular" components. These components are housed in frames of which there are three types, each offering different advantages.
- The console is a static structure, and can house the most powerful components, as well as a wired connection to the network.
- The laptop is a compromise between portability and power, capable of all but the most intensive operations in exchange for its mobility.
- The tablet is a pocket-sized supercomputer, capable of replacing most outdated computers still littering the station even with its moderate power.
Just like a normal computer, every frame requires a power supply, processing unit, drive and of course, programs to run. All hardware comes with an OS installed, which grants basic functionalities and UI. Programs can be downloaded from the NET as long as you have a network card installed. If for some reason you do not, or the quantum relay is off, you can install directly from disks.
Simple network cards will have some signal and work only on station and lavaland, while better cards will have good signal on station/lavaland and then some even in space! There even exist straight up ethernet connections for the console, though it's not clear exactly where the plug comes from on an asteroid.
All programs occupy a certain amount of space on the drive (shown below in brackets). A standard hard disk is currently enough to fit all of them.
These are the programs that all modular computers come pre-installed with, they can't be uninstalled.
Software Download Tool (4)
Downloads more programs from the NET. Some programs are locked behind certain ID accesses.
File browser (8)
Manages files, create text files.
Manages processes, programs or components of your frame.
These programs are all downloaded through the Software Download Tool, requiring a network connection and, in some cases, certain ID accesses.
Chat Client (8)
An IRC client. While you might think it more private than PDA messages, the RD (or anyone with his access) is the sysADMIN for this, meaning they can see who logs when and probably enter password-protected channels forcefully.
P2P Transfer Client (7)
A peer-to-peer file transfer system.
NTNet Diagnostics and Monitoring (12)
Monitors the NET itself and can shut down various NET functions separately such as IRC, downloader, P2P file transfer, station-bound functionalities, or the whole thing itself. Requires Network Access, by default granted to the Research Director and the Captain.
Alarm Monitor (5)
Monitors where air alarms on the station go off. Same as air alarm console.
Supermatter Monitoring (5)
Connects to the supermatter monitoring system to keep a constant watch on the status of supermatter based engines. Requires Engineering Access, by default granted to the all of the Engineering department, the Head of Security, and the Captain.
ID Card Modification (8)
Reads and modify access on IDs, open and close job position. Same as ID machine in HoP's office. Requires Bridge Access, by default granted to the Heads of Staff and the Captain. Requires an identification card authentication module.
Power Monitor (9)
Monitors the powergrid. Same as power monitoring console. Requires Engineering Access, by default granted to the all of the Engineering department, the Head of Security, and the Captain. Must be run on a console.
AI Integrity Restorer (12)
Restores an AI that was critically damaged. Same as AI restorer console in the RD's office. Requires Bridge Access, by default granted to the Heads of Staff and the Captain. Must be run on a console, requires an intelliCard interface slot.
These programs are downloaded through Syndinet, access by using an emag on a modular computer. Shame no one relies on the NET.
DoS Traffic Generator (20)
Launches a DoS attack on a NET's quantum relay. Relies as much on connection quality as processing power.
This program fries a computer's inner drives and PSU with a moderate shower of sparks. To arm it, simply run it after download and press the big red button. Its biggest strength is being able to change its name to anything and allow for acts of delayed sabotage.