this post was submitted on 28 Sep 2024
552 points (97.9% liked)

RPGMemes

10219 readers
62 users here now

Humor, jokes, memes about TTRPGs

founded 1 year ago
MODERATORS
 

Image transcription:

Computer science terms that sound like fantasy RPG abilities

I'll start:

  • Firewall
  • Virtual Memory
  • Single source of truth
  • Lossless Compression (this one sounds really powerful for some reason)

Your turn

Hard mode: Try not to include closer to domain-specific things like javascript library names

(page 4) 50 comments
sorted by: hot top controversial new old
[–] [email protected] 68 points 2 weeks ago
  • Terminal shell
  • Kill daemon
  • Timeshift
  • Cloud hosting
  • Ethernet
  • Overwrite memory
  • Free memory
  • Poison artifical intelligence
[–] [email protected] 7 points 2 weeks ago

Piracy wizards may teach you a homing missile spell of linking a magnet to someone and then sending a torrent of bits and pieces their way.

Lightning wizards can teach you how systematically shocking your minions should to some extent boost their efficiency in the same amount of time. They call it 'over clocking'.

And 'distributed denial of service' or 'dedossery', is a mastery of wizards who are just pissed, means sending a ton of said minions to one particular shitty tavern, ordering something and walking away en masse.

[–] [email protected] 8 points 2 weeks ago* (last edited 2 weeks ago) (3 children)

Binary search

Check bit

Control character

Sentinal value

Escape sequence

EDIT:

Git bisect (not sure if this one counts as computer sciency enough though)

load more comments (3 replies)
[–] [email protected] 19 points 2 weeks ago (1 children)

Y’all might be interested in the book series by Charles Stross starting with The Atrocity Archives.

load more comments (1 replies)
[–] [email protected] 8 points 2 weeks ago

Big-o and Little-o notation

FIFO and LIFO

[–] [email protected] 26 points 2 weeks ago (1 children)

Sanity check
Wildcard
Merge Bash Overwrite memory
Key binding
Class inheritance

load more comments (1 replies)
[–] [email protected] 4 points 2 weeks ago

Lock contention Parallelism Buffer overflow

[–] [email protected] 50 points 2 weeks ago (2 children)
load more comments (1 replies)
[–] [email protected] 16 points 2 weeks ago* (last edited 2 weeks ago)

This one’s not quite CS but oh well. Spell check - After a series of unfortunate accidents at the magical university, all novel spells must be submitted to the administration in writing to ensure their safety before first casting.

Root access - Access to the Underdark druid communication network, which is transmitted through a continent-wide system of interconnected tree roots.

Command: Line - A creative use of the command spell that forces an affected creature to spend their turn forming or waiting in an orderly line.

Neural net - The system of control used by an elder brain to control and coordinate illithids under its influence.

[–] [email protected] 3 points 2 weeks ago* (last edited 2 weeks ago)
  • TWAIN
  • daemon
  • Gopher
  • Kerberos
  • Oracle
  • Patch
  • ping
  • Perl
  • Python
  • Samba
  • Swing
  • troff
  • Vim
  • zip
  • tar
  • compress
  • deflate
  • Opus
  • Flac
  • Frostwire
  • Prodigy
  • USENET
  • nano
  • pico
  • Ethernet
  • Firewire
  • Wayland
[–] [email protected] 7 points 2 weeks ago

Guru Meditation

[–] [email protected] 14 points 2 weeks ago (1 children)

BSOD - BLUE SCREEN OF DEAD ☠️

load more comments (1 replies)
[–] [email protected] 11 points 2 weeks ago* (last edited 2 weeks ago)
  • Semaphore
  • Spanning tree
  • Spinlock
  • Recursive function
[–] [email protected] 4 points 2 weeks ago* (last edited 2 weeks ago)

Truncate

Force

Purge

Decimate

Warp transform

Innumerate

Checksum

Out of memory crash

Stuck process

Orphaned process

Killed child process

Force killed child process

Child workers

[–] [email protected] 69 points 2 weeks ago (1 children)
load more comments (1 replies)
[–] [email protected] 20 points 2 weeks ago (2 children)

Deadlock

Priority inversion

Debugging

Source compilation

[–] [email protected] 13 points 2 weeks ago (1 children)

Priority inversion sounds frighteningly subtle. You might not notice you’re under the effects of the spell because it manipulates priorities rather than bends will directly.

It still feels like your intent, but you’ve been rendered massively ineffective and it may take ages for someone to suspect magical involvement.

[–] [email protected] 10 points 2 weeks ago

That's also exactly how it works in computer science

load more comments (1 replies)
[–] [email protected] 14 points 2 weeks ago

Spoofing

Cryptojacking

[–] [email protected] 6 points 2 weeks ago* (last edited 2 weeks ago)

Null
Null Modem
Crossover Cable
Null Modem Cable with Handshake
Request to Send

Edit:
Proxy
Reverse Proxy

[–] [email protected] 13 points 2 weeks ago (1 children)

Authentication tokens - Some heirloom jewelry or letter of permission from the local royal family used to prove you are on their mission.

Gap analysis - when your party finds a crevasse or pit and determines if they can jump across.

Buffer - party member who casts buffs, usually a bard.

Microservices - when you barter with gnomes to repair your gear.

load more comments (1 replies)
[–] [email protected] 15 points 2 weeks ago (2 children)
load more comments (2 replies)
[–] [email protected] 79 points 2 weeks ago (1 children)
[–] [email protected] 28 points 2 weeks ago

One of those fucked me up real bad in Elden Ring

[–] [email protected] 11 points 2 weeks ago (2 children)

I feel like an obvious one is missing: oracle

[–] [email protected] 9 points 2 weeks ago (1 children)
[–] [email protected] 7 points 2 weeks ago

Using an oracle always does

load more comments (1 replies)
[–] [email protected] 154 points 2 weeks ago (5 children)

Scroll lock. To protect your scrolls.

load more comments (5 replies)
[–] [email protected] 21 points 2 weeks ago

Zero Trust: curse. You become suspicious of your allies.

[–] [email protected] 8 points 2 weeks ago (1 children)

Factory Reset

Hotspot

System Corruption

load more comments (1 replies)
[–] [email protected] 14 points 2 weeks ago (1 children)

PowerShell

Get-Date

Read-Host

Remove-Alias

Remove-Event

Sort-Object

[–] [email protected] 4 points 2 weeks ago

Remove Event: 5th level spell, cast as a reaction. Instantly negates the previous action. Spell DC wisdom check.

[–] [email protected] 10 points 2 weeks ago (2 children)

Inversion of control
Bsod
Cycle detection
Port knocking

load more comments (2 replies)
[–] [email protected] 21 points 2 weeks ago* (last edited 2 weeks ago) (1 children)

Agile Method

Kill

Clone

Daemon Process

[–] [email protected] 2 points 2 weeks ago

Clone always struck me as something that shouldn't be a spell but is.

[–] [email protected] 127 points 2 weeks ago (1 children)

World wide web would be an OP spell

load more comments (1 replies)
[–] [email protected] 54 points 2 weeks ago (1 children)
load more comments (1 replies)
[–] [email protected] 7 points 2 weeks ago (2 children)

Gateway Interplanetary filesystem Netmask Daemon Shadow copy Avatar

[–] [email protected] 3 points 2 weeks ago

Doesn't ipfs stand for interplenary file system?

load more comments (1 replies)
load more comments
view more: ‹ prev next ›