Tuesday, February 21, 2012

[System File Log]C.H.I.P.S: The Digital War

[System File Log]C.H.I.P.S: The Digital War

C.H.I.P.S: The Digital War

[OOC Log]C.H.I.P.S: The Digital War

[Update Log]C.H.I.P.S: The Digital War

These are all the files people within the system may come in counter with some lethal, some annoying, and others dangerous. You may add files but I must approve before I/you place it on here. The file types are placed into five categories:

Tracking Files: Files with the objective to track down corrupted files and inform other files to the location, if possible these files will destroy the files on their own. These files are also able to collect and retain information on the files they come in contact with. Note of advise: If these files obtain your identity, kill them if possible because they will not cease their task of tracking you down.

Harvesters
Threat: Unknown
Image

Banshees
Threat: High
Image

Tracers
Threat: Low
Image

Cyborgs
Threat: Low
Image

Exterminating Files: Files that are dispatched to corrupted areas so the corruption can be destroyed by them. These files always take care of the most severe corruptions and usually are assisted by the other files if needed.

Reapers
Threat:: Insane
Image

Breakers
Threat: Insane
Image

Dark Creepers
Threat: Unknown
Image

Wavers
Threat: medium
Image

T-Rex
Threat: Medium
Image

Sonicals
Threat: Low
Image

Knights
Threat: High
Image

Diamond Sixx
Threat: Unknown
Image

Slashers
Threat: High
Image

Security Files: Files that patrol, protect, and maintain important files within the system. These files only attack if corrupted files nearby deem themselves a threat to the important files; these files will go out their way to destroy the important files they were protecting if they are unable to keep it secure.

Drainers
Threat: Unknown
Image

Humanoids
Threat: High
Image

Robotics
Threat: Medium
Image

Scorpos
Threat: Medium
Image

Swarming Files: Files that are grouped in large numbers due to their small size, they deem a threat only if they are in large groups. These files are the only files able to call in reinforcements, usually the reinforcements are the same files as them.

Freezers
Threat: None
Image

Burners
Threat: Medium
Image

Rollers
Threat: High
Image

Cleansing Files: Files that patrol and maintain the system by cleaning up corrupted and infected files by repairing and reestablishing the file as the originated one. If corrupted files (such as humans) are cleansed, then their structure become redesigned so that they're part of the system making it impossible for them to leave CHIPS.

Helen4B
Threat: Unknown
Image

Vixens
Threat: Insane
Image

Arachobots
Threat: Medium
Image

Mist Weavers
Threat: High
Image

Quadbot
Threat: Low
Image

Wiping Files: Files that are directly sent by the system to clean up corrupted and infected files by destroying them with a one attempt; each having its own way of destruction. The system use these as a last resort since these files destroy everything within range leaving nothing but deep space until the system reconstructs that area.

Phoenix
Threat: Insane
Image

Dippers
Threat: Insane
Image

Angels
Threat: Insane
Image

Viral Files: Files created by the virus which is not detected as a threat by the system. These files go around destroying, corrupting, and/or infecting other files within the system.

Demons
Threat: High
Image

Sinners
Threat: Medium
Image

Hex8
Threat: High
Image

Screechers
Threat: Low
Image

Anima
Threat: Insane
Image

Dragoons
Threat: Unknown
Image

Source: http://feedproxy.google.com/~r/RolePlayGateway/~3/VMRj3t9MohQ/viewtopic.php

project runway all stars elin nordegren tangled ever after kansas state last house on the left last house on the left rich forever mixtape

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.