this post was submitted on 28 Sep 2024
556 points (97.9% liked)

RPGMemes

10410 readers
350 users here now

Humor, jokes, memes about TTRPGs

founded 2 years ago
MODERATORS
 

Image transcription:

Computer science terms that sound like fantasy RPG abilities

I'll start:

  • Firewall
  • Virtual Memory
  • Single source of truth
  • Lossless Compression (this one sounds really powerful for some reason)

Your turn

Hard mode: Try not to include closer to domain-specific things like javascript library names

(page 4) 50 comments
sorted by: hot top controversial new old
[–] [email protected] 71 points 2 months ago
  • Terminal shell
  • Kill daemon
  • Timeshift
  • Cloud hosting
  • Ethernet
  • Overwrite memory
  • Free memory
  • Poison artifical intelligence
[–] [email protected] 7 points 2 months ago

Piracy wizards may teach you a homing missile spell of linking a magnet to someone and then sending a torrent of bits and pieces their way.

Lightning wizards can teach you how systematically shocking your minions should to some extent boost their efficiency in the same amount of time. They call it 'over clocking'.

And 'distributed denial of service' or 'dedossery', is a mastery of wizards who are just pissed, means sending a ton of said minions to one particular shitty tavern, ordering something and walking away en masse.

[–] [email protected] 8 points 2 months ago* (last edited 2 months ago) (3 children)

Binary search

Check bit

Control character

Sentinal value

Escape sequence

EDIT:

Git bisect (not sure if this one counts as computer sciency enough though)

load more comments (3 replies)
[–] [email protected] 19 points 2 months ago (1 children)

Y’all might be interested in the book series by Charles Stross starting with The Atrocity Archives.

load more comments (1 replies)
[–] [email protected] 8 points 2 months ago

Big-o and Little-o notation

FIFO and LIFO

[–] [email protected] 26 points 2 months ago (1 children)

Sanity check
Wildcard
Merge Bash Overwrite memory
Key binding
Class inheritance

load more comments (1 replies)
[–] [email protected] 4 points 2 months ago

Lock contention Parallelism Buffer overflow

[–] [email protected] 52 points 2 months ago (2 children)
load more comments (1 replies)
[–] [email protected] 16 points 2 months ago* (last edited 2 months ago)

This one’s not quite CS but oh well. Spell check - After a series of unfortunate accidents at the magical university, all novel spells must be submitted to the administration in writing to ensure their safety before first casting.

Root access - Access to the Underdark druid communication network, which is transmitted through a continent-wide system of interconnected tree roots.

Command: Line - A creative use of the command spell that forces an affected creature to spend their turn forming or waiting in an orderly line.

Neural net - The system of control used by an elder brain to control and coordinate illithids under its influence.

[–] [email protected] 3 points 2 months ago* (last edited 2 months ago)
  • TWAIN
  • daemon
  • Gopher
  • Kerberos
  • Oracle
  • Patch
  • ping
  • Perl
  • Python
  • Samba
  • Swing
  • troff
  • Vim
  • zip
  • tar
  • compress
  • deflate
  • Opus
  • Flac
  • Frostwire
  • Prodigy
  • USENET
  • nano
  • pico
  • Ethernet
  • Firewire
  • Wayland
[–] [email protected] 7 points 2 months ago

Guru Meditation

[–] [email protected] 14 points 2 months ago (1 children)

BSOD - BLUE SCREEN OF DEAD ☠️

load more comments (1 replies)
[–] [email protected] 11 points 2 months ago* (last edited 2 months ago)
  • Semaphore
  • Spanning tree
  • Spinlock
  • Recursive function
[–] [email protected] 4 points 2 months ago* (last edited 2 months ago)

Truncate

Force

Purge

Decimate

Warp transform

Innumerate

Checksum

Out of memory crash

Stuck process

Orphaned process

Killed child process

Force killed child process

Child workers

[–] [email protected] 74 points 2 months ago (1 children)
load more comments (1 replies)
[–] [email protected] 20 points 2 months ago (2 children)

Deadlock

Priority inversion

Debugging

Source compilation

[–] [email protected] 13 points 2 months ago (1 children)

Priority inversion sounds frighteningly subtle. You might not notice you’re under the effects of the spell because it manipulates priorities rather than bends will directly.

It still feels like your intent, but you’ve been rendered massively ineffective and it may take ages for someone to suspect magical involvement.

[–] [email protected] 10 points 2 months ago

That's also exactly how it works in computer science

load more comments (1 replies)
[–] [email protected] 14 points 2 months ago

Spoofing

Cryptojacking

[–] [email protected] 6 points 2 months ago* (last edited 2 months ago)

Null
Null Modem
Crossover Cable
Null Modem Cable with Handshake
Request to Send

Edit:
Proxy
Reverse Proxy

[–] [email protected] 13 points 2 months ago (1 children)

Authentication tokens - Some heirloom jewelry or letter of permission from the local royal family used to prove you are on their mission.

Gap analysis - when your party finds a crevasse or pit and determines if they can jump across.

Buffer - party member who casts buffs, usually a bard.

Microservices - when you barter with gnomes to repair your gear.

load more comments (1 replies)
[–] [email protected] 15 points 2 months ago (2 children)
load more comments (2 replies)
[–] [email protected] 84 points 2 months ago (1 children)
[–] [email protected] 29 points 2 months ago

One of those fucked me up real bad in Elden Ring

[–] [email protected] 11 points 2 months ago (2 children)

I feel like an obvious one is missing: oracle

[–] [email protected] 9 points 2 months ago (1 children)
[–] [email protected] 7 points 2 months ago

Using an oracle always does

load more comments (1 replies)
[–] [email protected] 158 points 2 months ago (5 children)

Scroll lock. To protect your scrolls.

load more comments (5 replies)
[–] [email protected] 21 points 2 months ago

Zero Trust: curse. You become suspicious of your allies.

[–] [email protected] 8 points 2 months ago (1 children)

Factory Reset

Hotspot

System Corruption

load more comments (1 replies)
[–] [email protected] 14 points 2 months ago (1 children)

PowerShell

Get-Date

Read-Host

Remove-Alias

Remove-Event

Sort-Object

[–] [email protected] 4 points 2 months ago

Remove Event: 5th level spell, cast as a reaction. Instantly negates the previous action. Spell DC wisdom check.

[–] [email protected] 10 points 2 months ago (2 children)

Inversion of control
Bsod
Cycle detection
Port knocking

load more comments (2 replies)
[–] [email protected] 21 points 2 months ago* (last edited 2 months ago) (1 children)

Agile Method

Kill

Clone

Daemon Process

[–] [email protected] 2 points 2 months ago

Clone always struck me as something that shouldn't be a spell but is.

[–] [email protected] 132 points 2 months ago (1 children)

World wide web would be an OP spell

load more comments (1 replies)
[–] [email protected] 58 points 2 months ago (1 children)
load more comments (1 replies)
[–] [email protected] 7 points 2 months ago (2 children)

Gateway Interplanetary filesystem Netmask Daemon Shadow copy Avatar

[–] [email protected] 3 points 2 months ago

Doesn't ipfs stand for interplenary file system?

load more comments (1 replies)
load more comments
view more: ‹ prev next ›