533
submitted 6 months ago by morrowind@lemmy.ml to c/rpgmemes@ttrpg.network

Image transcription:

Computer science terms that sound like fantasy RPG abilities

I'll start:

  • Firewall
  • Virtual Memory
  • Single source of truth
  • Lossless Compression (this one sounds really powerful for some reason)

Your turn

Hard mode: Try not to include closer to domain-specific things like javascript library names

(page 2) 50 comments
sorted by: hot top controversial new old
[-] runjun@lemmy.world 19 points 6 months ago

Y’all might be interested in the book series by Charles Stross starting with The Atrocity Archives.

load more comments (1 replies)
[-] SkunkWorkz@lemmy.world 18 points 6 months ago
  • Cache miss
  • Bubble Sort
  • Vectorization
[-] SpaceNoodle@lemmy.world 18 points 6 months ago

Deadlock

Priority inversion

Debugging

Source compilation

[-] bleistift2@sopuli.xyz 18 points 6 months ago

Null pointer – sends the victim on a quest they can never fulfill.

[-] lkdm@programming.dev 17 points 6 months ago* (last edited 6 months ago)

spawn daemon

[-] leftenddev@slrpnk.net 16 points 6 months ago

Power word: Infinite Recursion

[-] papalonian@lemmy.world 16 points 6 months ago

Not necessarily PC related, but:

Uninterrupted Power Supply

load more comments (2 replies)
[-] ramjambamalam@lemmy.ca 16 points 6 months ago

Force Merge

[-] LibertyLizard@slrpnk.net 16 points 6 months ago* (last edited 6 months ago)

This one’s not quite CS but oh well. Spell check - After a series of unfortunate accidents at the magical university, all novel spells must be submitted to the administration in writing to ensure their safety before first casting.

Root access - Access to the Underdark druid communication network, which is transmitted through a continent-wide system of interconnected tree roots.

Command: Line - A creative use of the command spell that forces an affected creature to spend their turn forming or waiting in an orderly line.

Neural net - The system of control used by an elder brain to control and coordinate illithids under its influence.

[-] aeronmelon@lemmy.world 14 points 6 months ago

Bluetooth sounds like a negative effect. Similar to using Bluetooth in real life.

[-] Zachariah@lemmy.world 14 points 6 months ago

PowerShell

Get-Date

Read-Host

Remove-Alias

Remove-Event

Sort-Object

load more comments (1 replies)
[-] SGforce@lemmy.ca 13 points 6 months ago

Spoofing

Cryptojacking

[-] CaptainBlagbird@lemmy.world 13 points 6 months ago* (last edited 6 months ago)
  • Master / Slave
  • Gatekeeper
  • Anti virus
  • Force push
  • Bug
  • Forever loop
  • Break condition
  • Real time operating system
  • Blockchain
  • Agility measurement index (not really an ability, but sounds like it could be art of an RPG mechanic)
[-] finitebanjo@lemmy.world 13 points 6 months ago
[-] SkaveRat@discuss.tchncs.de 9 points 6 months ago

Null pointer sounds like a powerful spell

[-] themeatbridge@lemmy.world 12 points 6 months ago

Authentication tokens - Some heirloom jewelry or letter of permission from the local royal family used to prove you are on their mission.

Gap analysis - when your party finds a crevasse or pit and determines if they can jump across.

Buffer - party member who casts buffs, usually a bard.

Microservices - when you barter with gnomes to repair your gear.

load more comments (1 replies)
[-] UnityDevice@startrek.website 12 points 6 months ago

Hyperconvergence or hypervisor.

[-] mindbleach@sh.itjust.works 11 points 6 months ago
  • Knapsack problem
  • Pushdown automata
  • Zero-knowledge proof
  • Late binding
  • Borrow checker
  • Channel coding
  • Tail recursion
  • Camel case
  • Double float
  • Red-black trees
  • Quaternions

Lossy compression feels like cheating:

  • Block prediction
  • Motion compensation
  • Chroma subsampling
  • Frequency space
  • Time domain
[-] OmegaPillar@lemmy.ca 11 points 6 months ago* (last edited 6 months ago)
  • Semaphore
  • Spanning tree
  • Spinlock
  • Recursive function
[-] ryathal@sh.itjust.works 10 points 6 months ago

Inversion of control
Bsod
Cycle detection
Port knocking

load more comments (2 replies)
[-] daellat@lemmy.world 9 points 6 months ago

Mail storm

Perhaps not that deep "cs" but still :D

[-] Thyrian@ttrpg.network 9 points 6 months ago
  • scroll snapping
  • unit tests
  • vulnerability
  • fastboot
  • root access
  • abstraction level
  • unity framework
load more comments (3 replies)
[-] Zementid@feddit.nl 9 points 6 months ago

Silicium Bug = A insect creature made of quartz.

Gate Array = An ancient holy temple with partially defunct portals of unknown origin.

[-] Rin@lemm.ee 8 points 6 months ago
  • Higher order function
  • Rijndael cypher
  • Serpent cypher
[-] Aurenkin@sh.itjust.works 8 points 6 months ago* (last edited 6 months ago)

Binary search

Check bit

Control character

Sentinal value

Escape sequence

EDIT:

Git bisect (not sure if this one counts as computer sciency enough though)

load more comments (3 replies)
[-] wizardbeard@lemmy.dbzer0.com 8 points 6 months ago

Bounds execption: Allows larger objects to fit in smaller containers, ritual spell effective for 1 day, can be upcast to increase amount of "overfill", some check when retrieving the item for a chance of "corruption" (small chance to retrieve a different item, or have the "overfill" become something different like have the outer edge of a bar of gold be meat)

Paralellization: High level time magic, Allows the target multiple turns to be taken simultaneously, but an equivalent cooldown afterwards (waiting for all threads or jobs to return before being able to continue), so 3 turns at once means 2 turns the target can't do anything after.

Split brain configuration: Allows focusing on multiple concentration checks/spells at once. This could also be called paralellization, or multithreaded.

Pass By Reference enchantment: requires two identical items. Once enchanted, changes to one happen to both. Room for all sorts of shenanigans.

Private field: cast on an area to prevent entry/visibility into it by unauthorized entities. Sounds inside are not audible to unauthorized entities outside of it.

load more comments (3 replies)
[-] Tuxman@sh.itjust.works 8 points 6 months ago

I always found "The Perceptron" to have such a badass name…. 😅 (Math part was annoying though…)

[-] linearchaos@lemmy.world 7 points 6 months ago

Gateway Interplanetary filesystem Netmask Daemon Shadow copy Avatar

load more comments (2 replies)
[-] apotheotic@beehaw.org 7 points 6 months ago

Volatile Memory

PEBCAK

Secrets

Cloud Run

Kubernetes

Flash

Rest endpoint

[-] nik9000@programming.dev 7 points 6 months ago
[-] beebarfbadger@lemmy.world 7 points 6 months ago
  • 28k modem connection sounds *
[-] TwoBeeSan@lemmy.world 7 points 6 months ago

Factory Reset

Hotspot

System Corruption

load more comments (1 replies)
[-] dragonshouter@ttrpg.network 7 points 6 months ago

Shielded Twisted Wire rootkit worm recursive loop MAC address( kinda like a true name i guess) Administrator control

[-] finitebanjo@lemmy.world 7 points 6 months ago

Lossless Compression isn't actually powerful, its just an improved Lossy Compression which is admittedly terrifying to use in many cases.

[-] Matombo@feddit.org 7 points 6 months ago
  • kernelspace
  • make all
  • upstream and downstream
load more comments
this post was submitted on 28 Sep 2024
533 points (100.0% liked)

RPGMemes

11141 readers
67 users here now

Humor, jokes, memes about TTRPGs

founded 2 years ago
MODERATORS