Guide to Nanites: Difference between revisions

Jump to navigation Jump to search
508 bytes removed ,  15:20, 26 October 2023
Changed nanite consumption amounts and removed mind control nanites, fake death nanites, and paralysis nanites as per was changed PR #17858
(Add the Distributed Computing and Neural Network nanite programs)
(Changed nanite consumption amounts and removed mind control nanites, fake death nanites, and paralysis nanites as per was changed PR #17858)
 
Line 90: Line 90:
!Distributed Computing
!Distributed Computing
|The nanites aid the research servers by performing a portion of its calculations, increasing research point generation.
|The nanites aid the research servers by performing a portion of its calculations, increasing research point generation.
|0.2
|0.1
| --
| --
| --
| --
Line 98: Line 98:
!Neural Network
!Neural Network
|The nanites link the host's brains together forming a neural research network, that becomes more efficient with the amount of total hosts.
|The nanites link the host's brains together forming a neural research network, that becomes more efficient with the amount of total hosts.
|0.3
|0.2
| --
| --
| --
| --
Line 267: Line 267:
!Accelerated Regeneration
!Accelerated Regeneration
|The nanites boost the host's natural regeneration, increasing their healing speed. <i>Does not consume nanites while the host is undamaged.</i>
|The nanites boost the host's natural regeneration, increasing their healing speed. <i>Does not consume nanites while the host is undamaged.</i>
|2.5
|1.5
| --
| --
| --
| --
Line 275: Line 275:
!Temperature Adjustment
!Temperature Adjustment
|The nanites adjust the host's internal temperature to an ideal level. Does not consume nanites while the host is at an ideal temperature.
|The nanites adjust the host's internal temperature to an ideal level. Does not consume nanites while the host is at an ideal temperature.
|3.5
|2.5
| --
| --
| --
| --
Line 307: Line 307:
! Mechanical Repair
! Mechanical Repair
|The nanites fix damage in the host's mechanical limbs. Does not consume nanites if the limbs are undamaged.
|The nanites fix damage in the host's mechanical limbs. Does not consume nanites if the limbs are undamaged.
|0.5
|1
| --
| --
| --
| --
| Basic
|Basic
|Necrosis
|Necrosis
|-
|-
Line 319: Line 319:
| --
| --
|Harmonic
|Harmonic
| Hypoxemia, Necrosis
|Hypoxemia, Necrosis
|-
|-
!Bio-Reconstruction
!Bio-Reconstruction
| The nanites manually repair and replace organic cells, acting much faster than normal regeneration. However, this program cannot detect the difference between harmed and unharmed, causing it to consume nanites even if it has no effect.
|The nanites manually repair and replace organic cells, acting much faster than normal regeneration. However, this program cannot detect the difference between harmed and unharmed, causing it to consume nanites even if it has no effect.
|5.5
|7
| --
| --
| --
| --
| Harmonic
|Harmonic
| Hypoxemia, Necrosis
|Hypoxemia, Necrosis
|-
|-
!Neural Reimaging
!Neural Reimaging
Line 335: Line 335:
| --
| --
|Harmonic
|Harmonic
| Neuro-Necrosis, Brain Misfire
|Neuro-Necrosis, Brain Misfire
|-
|-
!Defibrillation
!Defibrillation
Line 342: Line 342:
|25
|25
|12s
|12s
| Harmonic
|Harmonic
|Shocking
|Shocking
|-
|-
|}
|}
=== Glitch Programs===
===Glitch Programs===
Defective programs caused by data corruption, and not otherwise obtainable. Generally, range from mildly to moderately dangerous. Can stack.
Defective programs caused by data corruption, and not otherwise obtainable. Generally, range from mildly to moderately dangerous. Can stack.
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
|-
|-
! scope="col" width="10%" |Program
! scope="col" width="10%" |Program
! scope="col" class="unsortable" | Effect
! scope="col" class="unsortable" |Effect
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" | Trigger Cost
! scope="col" width="5%" |Trigger Cost
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="7%" |Required Techweb
! scope="col" width="7%" |Required Techweb
Line 378: Line 378:
|0.25
|0.25
| --
| --
| --
| --
| --
| --
|Glitch
|Glitch
|-
|-
! Hypoxemia
!Hypoxemia
| The nanites prevent the host's blood from absorbing oxygen efficiently.
|The nanites prevent the host's blood from absorbing oxygen efficiently.
|0.75
|0.75
| --
| --
Line 392: Line 392:
!Neuro-Necrosis
!Neuro-Necrosis
|The nanites seek and attack brain cells, causing extensive neural damage to the host.
|The nanites seek and attack brain cells, causing extensive neural damage to the host.
| 0.75
|0.75
| --
| --
| --
| --
Line 398: Line 398:
|Necrosis
|Necrosis
|-
|-
! Brain Misfire
!Brain Misfire
|The nanites interfere with neural pathways, causing minor psychological disturbances.
|The nanites interfere with neural pathways, causing minor psychological disturbances.
|0.5
|0.5
Line 412: Line 412:
| --
| --
| --
| --
| Necrosis
|Necrosis
|-
|-
!Nerve Decay
!Nerve Decay
Line 420: Line 420:
| --
| --
| --
| --
| Necrosis
|Necrosis
|}
|}
===Weaponized Programs===
===Weaponized Programs===
Line 429: Line 429:
! scope="col" class="unsortable" |Effect
! scope="col" class="unsortable" |Effect
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" |Trigger Cost
! scope="col" width="5%" |Trigger Cost  
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="7%" |Required Techweb
! scope="col" width="7%" |Required Techweb
! scope="col" class="unsortable" width="8%" |Corruptions
! scope="col" class="unsortable" width="8%" |Corruptions
|-
|-
! Cellular Breakdown
!Cellular Breakdown
|The nanites destroy cellular structures in the host's body, causing brute damage.
|The nanites destroy cellular structures in the host's body, causing brute damage.
|1.5
|1.5
| --
| --
| --
| --
|Biological
|Biological
|Necrosis
|Necrosis
Line 448: Line 448:
| --
| --
|Biological
|Biological
| Toxin Buildup
|Toxin Buildup
|-
|-
!Memory Leak
!Memory Leak  
|This program invades the memory space used by other programs, causing frequent corruptions and errors.
|This program invades the memory space used by other programs, causing frequent corruptions and errors.
| 0
|0
| --
| --
| --
| --
Line 459: Line 459:
|-
|-
!Aggressive Replication
!Aggressive Replication
| Nanites will consume organic matter to improve their replication rate, damaging the host.
|Nanites will consume organic matter to improve their replication rate, damaging the host.
| -1
| -1
| --
| --
Line 467: Line 467:
|-
|-
!Meltdown
!Meltdown
| Causes an internal meltdown inside the nanites, causing internal burns inside the host as well as rapidly destroying the nanite population. Sets the nanites' safety threshold to 0 when activated.
|Causes an internal meltdown inside the nanites, causing internal burns inside the host as well as rapidly destroying the nanite population. Sets the nanites' safety threshold to 0 when activated.
|10
|10
| --
| --
Line 476: Line 476:
!Chain Detonation
!Chain Detonation
|Detonates all the nanites inside the host in a chain reaction when triggered.
|Detonates all the nanites inside the host in a chain reaction when triggered.
| 0
|0
|25
| 25
|10s
|10s
|Military
|Military
Line 484: Line 484:
!Heart-Stopper
!Heart-Stopper
|Stops the host's heart when triggered; restarts it if triggered again.
|Stops the host's heart when triggered; restarts it if triggered again.
| 0
|0
|12
| 12
|1s
|1s
| Military
|Military
|Nerve Decay
|Nerve Decay
|-
|-
!Cryogenic Treatment
!Cryogenic Treatment
| The nanites rapidly sink heat through the host's skin, lowering their temperature.
|The nanites rapidly sink heat through the host's skin, lowering their temperature.
| 1
|1
| --
| --
| --
| --
Line 499: Line 499:
|-
|-
!Sub-Dermal Combustion
!Sub-Dermal Combustion
| The nanites cause buildup of flammable fluids under the host's skin, then ignites them.
|The nanites cause buildup of flammable fluids under the host's skin, then ignites them.
|4
| --
| --
| Military
| Dermalysis, Cryogenic Treatment
|-
!Mind Control
|The nanites imprint an absolute directive onto the host's brain while they're active.
|3
|3
| --
| --
| --
| --
| Hazard
|Military
|Neuro-Necrosis, Brain Misfire
|Dermalysis, Cryogenic Treatment
|-
|-
|}
|}
=== Suppression Programs===
===Suppression Programs===
Programs with the goal of acting as a deterrent against the host. Generally nonlethal.
Programs with the goal of acting as a deterrent against the host. Generally nonlethal.
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
Line 522: Line 514:
! scope="col" class="unsortable" |Effect
! scope="col" class="unsortable" |Effect
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" | Trigger Cost
! scope="col" width="5%" |Trigger Cost
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="7%" |Required Techweb
! scope="col" width="7%" |Required Techweb
Line 528: Line 520:
|-
|-
!Electric Shock
!Electric Shock
| The nanites shock the host when triggered. Destroys a large amount of nanites!
|The nanites shock the host when triggered. Destroys a large amount of nanites!
| --
| --
|10
|10
Line 535: Line 527:
|Toxin Buildup
|Toxin Buildup
|-
|-
! Neural Shock
!Neural Shock
|The nanites pulse the host's nerves when triggered, inapacitating them for a short period.
|The nanites pulse the host's nerves when triggered, inapacitating them for a short period.
| --
| --
|4
|4
|30s
|30s
Line 550: Line 542:
|Synaptic
|Synaptic
|Neuro-Necrosis, Brain Misfire
|Neuro-Necrosis, Brain Misfire
|-
!Paralysis
|The nanites actively suppress nervous pulses, effectively paralyzing the host.
|3
| --
|  --
|Neural
|Nerve Decay
|-
!Death Simulation
|The nanites induce a death-like coma into the host, able to fool most medical scans.
|4.5
| --
|  --
|Harmonic
|Necrosis, Nerve Decay, Neuro-Necrosis
|-
|-
!Pacification
!Pacification
Line 572: Line 548:
| --
| --
| --
| --
| Synaptic
|Synaptic
|Neuro-Necrosis, Brain Misfire
|Neuro-Necrosis, Brain Misfire
|-
|-
Line 581: Line 557:
| --
| --
|Synaptic
|Synaptic
| Nerve Decay
|Nerve Decay
|-
|-
!Mute
!Mute
Line 587: Line 563:
|0.75
|0.75
| --
| --
| --
| --
|Synaptic
|Synaptic
|Neuro-Necrosis, Brain Misfire
|Neuro-Necrosis, Brain Misfire
Line 595: Line 571:
| --
| --
|3
|3
| 2s
|2s
|Synaptic
|Synaptic
|Neuro-Necrosis, Brain Misfire
|Neuro-Necrosis, Brain Misfire
|-
|-
!Skull Echo
!Skull Echo  
| The nanites echo a synthesized message inside the host's skull.
|The nanites echo a synthesized message inside the host's skull.
| --
| --
|1
|1
Line 616: Line 592:
|-
|-
|}
|}
===Sensor Programs ===
===Sensor Programs===
Programs that will self-pulse a given code when their condition is met.
Programs that will self-pulse a given code when their condition is met.
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
Line 623: Line 599:
! scope="col" class="unsortable" |Effect
! scope="col" class="unsortable" |Effect
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" |Trigger Cost
! scope="col" width="5%" |Trigger Cost  
! scope="col" width="5%" | Trigger Cooldown
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="7%" |Required Techweb
! scope="col" width="7%" |Required Techweb
! scope="col" class="unsortable" width="8%" |Corruptions
! scope="col" class="unsortable" width="8%" |Corruptions
Line 633: Line 609:
| --
| --
| --
| --
| Biological
|Biological
| Glitch
|Glitch
|-
|-
! Critical Health Sensor
!Critical Health Sensor
|The nanites receive a signal when the host first reaches critical health.
|The nanites receive a signal when the host first reaches critical health.
|0
|0
| --
| --
| --
| --
| Biological
|Biological
|Glitch
|Glitch
|-
|-
!Death Sensor
!Death Sensor
| The nanites receive a signal when they detect the host is dead.
|The nanites receive a signal when they detect the host is dead.
|0
|0
| --
| --
Line 653: Line 629:
|-
|-
!Nanite Volume Sensor
!Nanite Volume Sensor
|The nanites receive a signal when the nanite supply is above/below a certain percentage, with the safety threshold being 0%. If safety threshold is higher, it will skew the percentage. For example, with threshold 50, 100 volume will count as 50 available volume, which means 10% instead of 20%, and the full 500 volume will count as 90%.
|The nanites receive a signal when the nanite supply is above/below a certain percentage, with the safety threshold being 0%. If safety threshold is higher, it will skew the percentage. For example, with threshold 50, 100 volume will count as 50 available volume, which means 10% instead of 20%, and the full 500 volume will count as 90%.  
|0
|0
| --
| --
| --
| --
| Basic
|Basic
|Glitch
|Glitch
|-
|-
!Damage Sensor
!Damage Sensor
| The nanites receive a signal when a host's specific damage type is above/below a target value.
|The nanites receive a signal when a host's specific damage type is above/below a target value.
|0
|0
| --
| --
Line 670: Line 646:
!Voice Sensor
!Voice Sensor
|Sends a signal when the nanites hear a determined word or sentence.
|Sends a signal when the nanites hear a determined word or sentence.
| 0
|0
| --
| --
| --
| --
Line 684: Line 660:
*Sensor Programs are the key towards making programs work when you want them to or when it would only make sense. Don't let programs run all the time because it can drain volume drastically.
*Sensor Programs are the key towards making programs work when you want them to or when it would only make sense. Don't let programs run all the time because it can drain volume drastically.
*The cloud allows you to have more deviation in your nanites. On cloud 1 you could have something for the public. On cloud 2 you could have nanites dedicated to security.
*The cloud allows you to have more deviation in your nanites. On cloud 1 you could have something for the public. On cloud 2 you could have nanites dedicated to security.
* It's a good idea to keep tight wraps on who messes with the cloud. Make sure to shutdown <s>Mcgreytiderthe3rd</s> Unauthorized Crew from approaching it at all cost. If they were to upload something malicious it could mean a shuttle call.
*It's a good idea to keep tight wraps on who messes with the cloud. Make sure to shutdown <s>Mcgreytiderthe3rd</s> Unauthorized Crew from approaching it at all cost. If they were to upload something malicious it could mean a shuttle call.
*Unless you are an antagonist with hijack, or your captain has his eyes towards a special way to use the weaponized programs, it's best you stay far clear of them. These programs can cause harm and death to a lot of people at once.
*Unless you are an antagonist with hijack, or your captain has his eyes towards a special way to use the weaponized programs, it's best you stay far clear of them. These programs can cause harm and death to a lot of people at once.
*The Nanite remote controller can be used to activate said nanites depending on the code. It can activate one person, a group or only local and relay. Also handy in testing out your nanites to activate them and make sure they work.
*The Nanite remote controller can be used to activate said nanites depending on the code. It can activate one person, a group or only local and relay. Also handy in testing out your nanites to activate them and make sure they work.
2

edits

Navigation menu