this post was submitted on 28 Sep 2024
517 points (97.8% liked)

RPGMemes

10219 readers
102 users here now

Humor, jokes, memes about TTRPGs

founded 1 year ago
MODERATORS
 

Image transcription:

Computer science terms that sound like fantasy RPG abilities

I'll start:

  • Firewall
  • Virtual Memory
  • Single source of truth
  • Lossless Compression (this one sounds really powerful for some reason)

Your turn

Hard mode: Try not to include closer to domain-specific things like javascript library names

(page 2) 50 comments
sorted by: hot top controversial new old
[–] [email protected] 18 points 2 weeks ago (1 children)

Y’all might be interested in the book series by Charles Stross starting with The Atrocity Archives.

load more comments (1 replies)
[–] [email protected] 18 points 2 weeks ago (1 children)

Reroot tree: Tree digs itself out of the ground, walks to another location and takes root, as if it's always been there.

Heap sort: More advanced technique for which Reroot tree is a prerequisite for some reason. Arranges assortments of things into neat piles with only one kind of object per pile. Very useful when looking for things in treasure chambers.

[–] [email protected] 12 points 2 weeks ago

"I cast heap sort on the owlbear."

"..."

"The owlbear is sorted into neat piles, the first containing hair/nails/claws/beaks, the second feathers, the third bone, the fourth meat, the fifth blood.."

[–] [email protected] 18 points 2 weeks ago
  • Cache miss
  • Bubble Sort
  • Vectorization
[–] [email protected] 17 points 2 weeks ago (2 children)

Boot Loop - ties someone's shoelaces together

load more comments (2 replies)
[–] [email protected] 16 points 2 weeks ago (2 children)

Not necessarily PC related, but:

Uninterrupted Power Supply

load more comments (2 replies)
[–] [email protected] 16 points 2 weeks ago* (last edited 2 weeks ago)

This one’s not quite CS but oh well. Spell check - After a series of unfortunate accidents at the magical university, all novel spells must be submitted to the administration in writing to ensure their safety before first casting.

Root access - Access to the Underdark druid communication network, which is transmitted through a continent-wide system of interconnected tree roots.

Command: Line - A creative use of the command spell that forces an affected creature to spend their turn forming or waiting in an orderly line.

Neural net - The system of control used by an elder brain to control and coordinate illithids under its influence.

[–] [email protected] 16 points 2 weeks ago

Null pointer – sends the victim on a quest they can never fulfill.

[–] [email protected] 15 points 2 weeks ago* (last edited 2 weeks ago)

spawn daemon

[–] [email protected] 15 points 2 weeks ago

Power word: Infinite Recursion

[–] [email protected] 15 points 2 weeks ago (4 children)
load more comments (4 replies)
[–] [email protected] 15 points 2 weeks ago

Force Merge

[–] [email protected] 14 points 2 weeks ago

Spoofing

Cryptojacking

[–] [email protected] 14 points 2 weeks ago (1 children)

PowerShell

Get-Date

Read-Host

Remove-Alias

Remove-Event

Sort-Object

load more comments (1 replies)
[–] [email protected] 13 points 2 weeks ago* (last edited 2 weeks ago)
  • Master / Slave
  • Gatekeeper
  • Anti virus
  • Force push
  • Bug
  • Forever loop
  • Break condition
  • Real time operating system
  • Blockchain
  • Agility measurement index (not really an ability, but sounds like it could be art of an RPG mechanic)
[–] [email protected] 13 points 2 weeks ago

Bluetooth sounds like a negative effect. Similar to using Bluetooth in real life.

[–] [email protected] 13 points 2 weeks ago (1 children)

Authentication tokens - Some heirloom jewelry or letter of permission from the local royal family used to prove you are on their mission.

Gap analysis - when your party finds a crevasse or pit and determines if they can jump across.

Buffer - party member who casts buffs, usually a bard.

Microservices - when you barter with gnomes to repair your gear.

load more comments (1 replies)
[–] [email protected] 12 points 2 weeks ago

Hyperconvergence or hypervisor.

[–] [email protected] 11 points 2 weeks ago* (last edited 2 weeks ago)
  • Semaphore
  • Spanning tree
  • Spinlock
  • Recursive function
[–] [email protected] 10 points 2 weeks ago (2 children)

Inversion of control
Bsod
Cycle detection
Port knocking

load more comments (2 replies)
[–] [email protected] 10 points 2 weeks ago (2 children)
[–] [email protected] 9 points 2 weeks ago

Null pointer sounds like a powerful spell

[–] [email protected] 8 points 2 weeks ago (1 children)

Isn't there a film about saving him?

load more comments (1 replies)
[–] [email protected] 10 points 2 weeks ago

Mail storm

Perhaps not that deep "cs" but still :D

[–] [email protected] 10 points 2 weeks ago
  • Knapsack problem
  • Pushdown automata
  • Zero-knowledge proof
  • Late binding
  • Borrow checker
  • Channel coding
  • Tail recursion
  • Camel case
  • Double float
  • Red-black trees
  • Quaternions

Lossy compression feels like cheating:

  • Block prediction
  • Motion compensation
  • Chroma subsampling
  • Frequency space
  • Time domain
[–] [email protected] 10 points 2 weeks ago (1 children)

BSOD - BLUE SCREEN OF DEAD ☠️

load more comments (1 replies)
[–] [email protected] 9 points 2 weeks ago

Silicium Bug = A insect creature made of quartz.

Gate Array = An ancient holy temple with partially defunct portals of unknown origin.

[–] [email protected] 9 points 2 weeks ago (3 children)
  • scroll snapping
  • unit tests
  • vulnerability
  • fastboot
  • root access
  • abstraction level
  • unity framework
load more comments (3 replies)
[–] [email protected] 8 points 2 weeks ago* (last edited 2 weeks ago) (3 children)

Binary search

Check bit

Control character

Sentinal value

Escape sequence

EDIT:

Git bisect (not sure if this one counts as computer sciency enough though)

load more comments (3 replies)
[–] [email protected] 8 points 2 weeks ago (1 children)

Factory Reset

Hotspot

System Corruption

load more comments (1 replies)
[–] [email protected] 8 points 2 weeks ago

I always found "The Perceptron" to have such a badass name…. 😅 (Math part was annoying though…)

[–] [email protected] 8 points 2 weeks ago (3 children)

Bounds execption: Allows larger objects to fit in smaller containers, ritual spell effective for 1 day, can be upcast to increase amount of "overfill", some check when retrieving the item for a chance of "corruption" (small chance to retrieve a different item, or have the "overfill" become something different like have the outer edge of a bar of gold be meat)

Paralellization: High level time magic, Allows the target multiple turns to be taken simultaneously, but an equivalent cooldown afterwards (waiting for all threads or jobs to return before being able to continue), so 3 turns at once means 2 turns the target can't do anything after.

Split brain configuration: Allows focusing on multiple concentration checks/spells at once. This could also be called paralellization, or multithreaded.

Pass By Reference enchantment: requires two identical items. Once enchanted, changes to one happen to both. Room for all sorts of shenanigans.

Private field: cast on an area to prevent entry/visibility into it by unauthorized entities. Sounds inside are not audible to unauthorized entities outside of it.

load more comments (3 replies)
[–] [email protected] 8 points 2 weeks ago (1 children)

Lossless Compression isn't actually powerful, its just an improved Lossy Compression which is admittedly terrifying to use in many cases.

[–] [email protected] 8 points 2 weeks ago (1 children)

So you're saying if I use it... they'll be squished and lose random pieces of themselves?

load more comments (1 replies)
[–] [email protected] 7 points 2 weeks ago (2 children)

Gateway Interplanetary filesystem Netmask Daemon Shadow copy Avatar

load more comments (2 replies)
[–] [email protected] 7 points 2 weeks ago
  • 28k modem connection sounds *
load more comments
view more: ‹ prev next ›