This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
sunnys_guide_to_programming_and_deckbuilding [2023/02/17 19:04] – [Ready. Set. Build? (An explanation of the skills necessary)] khai | sunnys_guide_to_programming_and_deckbuilding [2023/06/17 14:12] (current) – [Ready. Set. Program? (An explanation of the skills necessary)] khai | ||
---|---|---|---|
Line 102: | Line 102: | ||
|9 |BattleTac|No.|(NERP)Use your comlink program to assist each other in the matrix!(NERP)| | |9 |BattleTac|No.|(NERP)Use your comlink program to assist each other in the matrix!(NERP)| | ||
|10|Compressor|No.|(NERP)Potentially compresses files, making them load/ | |10|Compressor|No.|(NERP)Potentially compresses files, making them load/ | ||
- | |11|Analyze|No.|Allows **ANALYZE** actions (host, security, subsystem, paydata, file, icon ) to succeed. **LOCATE** IC and uses the Analyze utility! (NERP: Locate Slave, which is used to find security cameras and other slaved devices uses the Analyze utility) | | + | |11|Analyze|No.|Allows **ANALYZE** actions (host, security, subsystem, paydata, file, icon ) to succeed. **LOCATE** IC uses the Analyze utility! (NERP: Locate Slave, which is used to find security cameras and other slaved devices uses the Analyze utility) | |
|12|Decrypt|No.|**DECRYPT** access, files, slaved subsystems.| | |12|Decrypt|No.|**DECRYPT** access, files, slaved subsystems.| | ||
|13|Deception|No.|Crucial for **LOGON** and graceful **LOGOFF**.| | |13|Deception|No.|Crucial for **LOGON** and graceful **LOGOFF**.| |