Computers (Int)

Computers is your ability to work with computer systems and some technological equipment. Even if you're untrained in Computers, you can use it for the following general skill actions.
  • Recall Knowledge about digital and virtual equipment, digital hazards, computer programs, and vidgames.

Computers Trained Actions

Computers Untrained Actions

Access Infosphere

Requirements You are using a device with infosphere access.

You attempt to access a local network, known as an infosphere, to come up with information on a topic. This typically takes 10 minutes of research to find information, with results like Recalling Knowledge on a topic. Larger investigations or topics could require several hours, while single-word answers of information common to that settlement's infosphere may only take a minute, based on the GM's discretion. Significant and longer investigations should use the research subsystem (GM Core). The GM determines the DC based on the topic you're researching. This can be further influenced by the quality of the local infosphere and what information it might possess on the topic, and how well organized it is.
Critical SuccessYou find the information you were searching for. If this was used on a topic you could have used Recall Knowledge on, you instead find this information in 1 minute.
SuccessYou find the information you were looking for.
Critical FailureYou find misleading information thanks to incorrect data or online pranksters. The GM provides you false information on your topic of investigation (or decides to give you no information, as on a failure).

Operate Device

Requirements You are using a computer or similar device.

You perform a basic task using a digital device, such as operating a basic program or playing a vidgame. You might also use this if the device you're using has a physical component, such as 3D-tracking or requiring specific motions to activate features. The GM determines the DC based on the action you're taking.
Critical SuccessYou excel at what you are doing, learning secrets from the program or advanced functionality. If it's a game, then you win it with record timing based on average completion rates.
SuccessYou manage to operate the device in the necessary manner, including getting basic functionality. You gain general information from the program.
FailureYou can't understand the program or game and take a –2 circumstance penalty to further attempts to access or play it for the next day.
Critical FailureYou fail to access the game or make a mistake that prevents you from accessing the program (such as forgetting a password and locking yourself out of the program) for the next day.

Sample Operate Device Tasks

Untrained check mail, play games, turn device off (and on again)
Trained advanced games, organize corporate mailboxes
Expert highly competitive games, organize servers
Master games at a planetary competitive level, manage large databases
Legendary play games at a galactic competitive level, manage interplanetary networks using Drift beacons

Computers Trained Actions

Disable a Device [two-actions]


This action allows you to disarm a trap or another complex device. Often, a device requires numerous successes before becoming disabled, depending on its construction and complexity. An infiltrator's toolkit is helpful and sometimes even required to Disable a Device, as determined by the GM, and sometimes a device requires a higher proficiency rank in Thievery to disable it.
Your Thievery check result determines your progress.
Critical SuccessYou disable the device, or you achieve two successes toward disabling a device requiring more than one success. You leave no trace of your tampering, and you can rearm the device later, if that type of device can be rearmed.
SuccessYou disable the device, or you achieve one success toward disabling a device that requires more than one success.
Critical FailureYou trigger the device.

Hack

Requirements You have a hacking toolkit.

You try to access, control, or change an active secured system. In most cases, this attempt is made against a local computer system that you access directly or indirectly through use of a hacking toolkit. Attempt a Computers check to determine if you can access the targeted system. Computers with improved systems might require multiple successes to access.
Critical SuccessYou access the system, or you achieve two successes toward accessing a system requiring more than one success. You leave no trace of your tampering.
SuccessYou access the system, or you achieve one success toward accessing a system that requires more than one success.
FailureYou fail to access the system or achieve any success toward accessing a system that requires more than one success. Some computerized systems might have security measures that activate on a failure.
Critical FailureYou activate specially ingrained security protocols or completely lock yourself out of the system. Being locked out of a system prevents you from attempting another check to access it for the next hour.