User Tools

Site Tools


computer_use_skill

This is an old revision of the document!


Content-Type: text/x-zim-wiki Wiki-Format: zim 0.4 Creation-Date: 2013-07-26T00:24:33-04:00

Computer Use (Skill)

Created Friday 26 July 2013

COMPUTER USE (INT)

Trained/Untrained Use this skill to access computer systems (including those which run a starship), write or modify computer programs, and override or bypass computer-controlled devices. This skill is centrally important to many actions in the Grid, as well. Check: Most normal computer operations, such as using a typical consumer application or doing research on the Grid, don’t require a Computer Use check, though doing research may require a Research check. Additionally, many public access computers run Assist programs that allow the user to act as if trained with a small number of ranks in the Computer Use skill. More complex tasks, however, including hacking of any sort, programming Shadows, and so on, require trained Computer Use checks. Gridrunning and hacking are covered under Robots and Computers, but less complicated uses of the skill and uses that don’t involve the Grid are covered here.

The following applications of the Computer Use skill can be used untrained.

Conduct Active Sensor Scan: Using a starship’s sensors to analyze another ship or object in sensor range requires a Computer Use check (DC 15). An active sensor scan conducted over a vast distance (for example, across a star system) or subject to some form of disturbance or interference (such as solar flares) may apply a –5 or worse penalty, at the GM’s discretion. Conducting an active sensor scan is a move action. Send Transmission: Routine communications like hailing a nearby ship or operating a mass– or laser-transceiver, are accom-plished with a Computer Use check (DC 10). Operating a drivesat relay and other, more complicated transmissions require checks at DC’s of 20 and above. Sending a transmission is a move action; operating a drivesat and other complex function require full round actions or longer. Find File: Finding a specific file on a system with which you are unfamiliar requires a Computer Use check. The DC for the check and the time required depend upon the size and complexity of the system you’re searching. If your target is beyond your access, you learn the next portal to defeat. You can take 10 or 20 only in systems in which you are an authorized user. Failing Find File checks when hacking bears the same risk of detection as failed checks to overcome Portals and Permissions.

Size of Area Accessed DC Time Personal computer or site 10 1 action Small network/menu 15 1 round Large network/directory 25 1 minute Massive network/root directory 35 10 minutes

The following applications of the Computer Use skill cannot be used untrained:

Access the Node: d20m Alter Program: d20sw Conduct Complex Search: d20sw Cover Tracks: swhg Defeat Computer Security: d20m Defend Security: d20m Degrade Programming: d20m False Sensor Readings: This use of the Computer Use skill allows a character to modify ship, vehicle, mecha, or personal sensor systems to generate false sensor readings. This can be done in two ways: by reprogramming the sensors that the character wants to give the false readings, or by using another sensor system to broadcast a false sensor profile to confuse other sensors. Either method is a fill-round action. In order to alter a sensor system to produce false readings whenever it is used, the character need only make a normal Computer Use check (using any normal modifiers that would factor into the check for the system) to alter the system’s programming. Once the check is made, the character may decide whether the sensors provide exaggerated results (detecting small starfighters as huge capital ships, sensing high levels of radiation where the levels are low, etc.), understated results (detecting clean air where there are toxic gases, detecting a small scout fighter where there is a heavy cruiser, etc.), or no results at all. Suspicious characters may recali-brate the sensors by making a computer Use check of their own, with a DC equal to the check of the character who originally altered the sensors. The second method of creating a false sensor profile uses an existing sensor array to broadcast false readings so that any attempts to scan the ship, character, mecha, etc. made by other sensors produce inaccurate results. The character may then make a Computer Use check to alter the sensor profile; the base DC for this check is 15, modified by the fol-lowing factors: Find File: d20m Interface with Alien Computer: In the decades or centuries that humanity has interacted with the familiar, advanced, alien species (fraal, t’sa, and mechalus), the technology of these species has become quite compatible. Computers and other technology of these species interface and communicate easily and routinely. In cases of new and unfamiliar species, however, it requires time and Computer Use checks to get the systems to interface. If the character has some passing familiarity with the race, and some knowledge of its language (or a program that does), it takes a full-round action and a Computer Use check (DC 20) to interface with the system. If the species and its technology are completely unfamiliar, it takes 30 hours minus the character’s ranks in Computer Use and a Computer Use check (DC 30) to complete the interface. The gamemaster may adjust this time and the DC based on how unfamiliar the species is and how incompatible the computer systems are. Jam Transmission: Computer Use skill can be used to prevent a ship, facility, or other transmitter/receiver from sending and receiving transmissions. An opposed check must be must made between the two systems operators (DC 15 for an unmanned computer) for each transmission, and only frequencies and transmission types that the character has access to may be jammed. Jamming a transmission is a full-round action. Operate a Remote Device: d20m Power Up/Power Down System: A character in control of a computer system can use the Computer Use skill to siphon power away from or to any system connected to that computer. With a simple Computer Use check (DC 20), a character may activate or deactivate any such system as a move action. Scramble/Unscramble Transmission: Computer Use can be used to scramble a transmission. This requires a full-round action and a Computer Use check. The result of the check determines the DC for any unauthorized attempt to unscramble the transmission. The intended recipients usually have a software key that allows them to unscramble the transmission without a check. Unscrambling the transmission, with or without a key, is also a full-round action. Shipboard Security: swhg Ship Systems: d20sw Use Alien Computers: Using the computer systems of an unfamiliar alien species can be quite problematic. Any Computer Use checks made on the unfamiliar system incur a –10 penalty, unless the character has the Read & Write Language skill (or software) for that species, in which case the penalty is reduced to –5. Write Computer Program: Writing a computer program requires the Craft (software) skill instead of Computer Use. De-scriptions of programs and the DCs for their creation are covered in Chapter 13: Robots and Computers. Try Again: You can usually try as many times as necessary to accomplish a given ap-plication of the Computer Use skill. Changing circumstances may, however, may make it harder, impossible, or pointless to try again. Special: You can take 10 when making a Computer Use check, but you can only take 20 when your action doesn’t involve any penalty for failure (not when hacking, for example). A character with the Gearhead feat gets a +2 bonus to all Computer Use checks, all Mechalus (Species) receive a +2 bonus to all Computer use checks and residents from Insight receive a +2 bonus to all Computer Use checks. Special: Whenever you are remotely accessing a computer, network, or device (as through the Grid), the quality of your connection can limit your maximum total modifier (including all bonuses) to your Computer Use check. This is never the case when you are accessing a computer directly. Remote access of systems is explained in Robots and Computers.

computer_use_skill.1377758160.txt.gz · Last modified: 2021/12/04 00:41 (external edit)