this post was submitted on 28 Sep 2024
529 points (97.8% liked)

RPGMemes

10342 readers
1 users here now

Humor, jokes, memes about TTRPGs

founded 1 year ago
MODERATORS
 

Image transcription:

Computer science terms that sound like fantasy RPG abilities

I'll start:

  • Firewall
  • Virtual Memory
  • Single source of truth
  • Lossless Compression (this one sounds really powerful for some reason)

Your turn

Hard mode: Try not to include closer to domain-specific things like javascript library names

top 50 comments
sorted by: hot top controversial new old
[–] Davel23@fedia.io 154 points 1 month ago (2 children)

Scroll lock. To protect your scrolls.

[–] papalonian@lemmy.world 19 points 1 month ago (3 children)

Think that's that wizards get when they're having trouble studying.

load more comments (3 replies)
load more comments (1 replies)
[–] PugJesus@lemmy.world 139 points 1 month ago (2 children)
[–] SzethFriendOfNimi@lemmy.world 46 points 1 month ago (1 children)

The orc becomes a pile of gelatin, quivering, you now must choose what it will become.

Roll for…

[–] sbv@sh.itjust.works 50 points 1 month ago (1 children)
[–] SzethFriendOfNimi@lemmy.world 30 points 1 month ago (1 children)

You roll a 1.

This causes an unauthorized access exception and a giant bouncer rapidly approaches, screaming in fury.

load more comments (1 replies)
[–] TopRamenBinLaden@sh.itjust.works 22 points 1 month ago (2 children)

Encapsulation kinda sounds like it could be a spell too. That's 2/3 pillars of OOP.

load more comments (2 replies)
[–] cowdoy@lemmy.ca 129 points 1 month ago (1 children)

World wide web would be an OP spell

[–] SzethFriendOfNimi@lemmy.world 22 points 1 month ago

A crack forms below you… and suddenly a tunnel collapses inward beneath your feet.

After a short while your fall is arrested. You are now snagged in a web, in the dim light lit from where you fell you can see this web goes on, all around you, seemingly forever.

[–] airbreather@lemmy.world 109 points 1 month ago (1 children)
[–] cerement@slrpnk.net 36 points 1 month ago (1 children)

a list of named vulnerabilities would be a great starter

[–] SzethFriendOfNimi@lemmy.world 38 points 1 month ago (1 children)

I cast CVE-2014-0160… at the darkness

load more comments (1 replies)
[–] Kolanaki@yiffit.net 92 points 1 month ago (3 children)

I am a level 17 Install Wizard.

[–] aeronmelon@lemmy.world 41 points 1 month ago (1 children)

Installation Wizard - A wizard hired to protect a specific building or location.

load more comments (1 replies)
load more comments (1 replies)
[–] Remotedeck@discuss.tchncs.de 75 points 1 month ago (1 children)
[–] WadeTheWizard@fedia.io 28 points 1 month ago

One of those fucked me up real bad in Elden Ring

[–] Dagnet@lemmy.world 72 points 1 month ago (1 children)
load more comments (1 replies)
[–] cranberryjam@lemmy.blahaj.zone 70 points 1 month ago
  • Terminal shell
  • Kill daemon
  • Timeshift
  • Cloud hosting
  • Ethernet
  • Overwrite memory
  • Free memory
  • Poison artifical intelligence
[–] x2Zero7@sh.itjust.works 53 points 1 month ago* (last edited 1 month ago)

Terminal escape

Privilege escalation

Command injection

[–] wilecoyote@programming.dev 50 points 1 month ago (2 children)
load more comments (1 replies)
[–] Strayce@lemmy.sdf.org 50 points 1 month ago* (last edited 1 month ago) (2 children)

Default Gateway

Split Horizon

Routing Overhead

Broadcast Storm

edit:fkn markdown

[–] rustydrd@sh.itjust.works 20 points 1 month ago

Split Horizon sounds really high-level.

load more comments (1 replies)
[–] drspod@lemmy.ml 50 points 1 month ago (1 children)
load more comments (1 replies)
[–] thelsim@sh.itjust.works 49 points 1 month ago* (last edited 1 month ago) (1 children)

I had a bit too much fun with these :)

Magical Items
  • The Bandwidth Cap
    Cursed item that limits the magical power of it's wearer
  • The Token Ring
    Magical ring that allows the wielder to communicate over large distances. They can receive messages from one token ring and send message to another.
  • The Memory Barrier
    Protective charm that shields the mind from intrusion.
  • The Shadow Register
    A magical ledger that records secrets and hidden locations in the immediate area.
  • The Superscalar
    A legendary shimmering sword that can strike multiple foes in a single attack.
Spells
  • Loopback
    Redirects a spell to its point of origin.
  • Jabber
    Causes the target to produce incoherent speech and lose its train of thought.
  • Branch Prediction
    Gives the caster foresight to predict their opponent's next action.
  • Traceroute
    A tracking spell that reveals the path of a target.
  • Mask
    Hides the caster's true identity.
  • Hypertransport
    Enables instantaneous movement over short distances.
  • Interrupt
    Counterspell to disrupt an enemy's casting.
Spell modifiers
  • Broadcast
    Modifies spell to affect a large area.
  • Unicast
    Modifies spell to affect a single point with maximum damage.
  • Multicast
    Modfies spell to affect multiple selected targets.
  • Repeater
    Modifies spell to recast itself over multiple turns.
load more comments (1 replies)
[–] itslilith@lemmy.blahaj.zone 39 points 1 month ago (1 children)
  • Hypervisor
  • time daemon
  • privilege escalation
load more comments (1 replies)
[–] Sanctus@lemmy.world 37 points 1 month ago

Asynchronous Threads

Port Forward (this one just sounds like a dope place)

Remote Host

Domain Controller

Immutable Type

[–] Courantdair@jlai.lu 36 points 1 month ago (5 children)
  • Big endian (a very powerful NPC)
  • Hardware abstraction (a spell that makes all the stuff disappears)
  • Obfuscation (invisibility spell)
  • Multiplexing (ability to cast several spells as one)
  • Dangling reference (when wrong information is given by somebody)
  • Curiously Recurring Template Pattern (basically crop circles)
  • Pure virtual method (anything somebody learned but will never use)
  • Diamond inheritance (when someone in the party dies and all of their money is spread accross the others)

Can you tell what's my job?

load more comments (5 replies)
[–] Banichan@dormi.zone 36 points 1 month ago

CAT5e sounds like a fifth-edition ruleset

[–] Godnroc@lemmy.world 35 points 1 month ago
[–] outstanding_bond@mander.xyz 35 points 1 month ago (1 children)
  • rowhammer
  • rainbow table
  • global interpreter lock
  • race condition (atrocity?)
  • core dump
load more comments (1 replies)
[–] blibla@slrpnk.net 30 points 1 month ago (3 children)
load more comments (3 replies)
[–] thericofactor@sh.itjust.works 27 points 1 month ago (1 children)
load more comments (1 replies)
[–] CptBread@lemmy.world 26 points 1 month ago* (last edited 1 month ago)

Memory leak

Destructor

Dynamic dispatch

Execute

[–] MyTurtleSwimsUpsideDown@fedia.io 26 points 1 month ago (1 children)

Sanity check
Wildcard
Merge Bash Overwrite memory
Key binding
Class inheritance

load more comments (1 replies)
[–] xtrapoletariat@beehaw.org 25 points 1 month ago* (last edited 1 month ago) (1 children)
  • Brute Force Attack
  • Markov Chain
  • Singular Matrix
  • Pow
  • map
  • bind
  • variable name (thief's favorite)
  • Ballmer Peak
  • Fourier Transformation (2nd level: FFT)
  • Gaussian Elimination
  • Double
load more comments (1 replies)
[–] ace_garp@lemmy.world 25 points 1 month ago (5 children)
  • Race condition

  • Physical Layer

  • Fast Fourier Transform

  • COBOL

  • Penetration testing

  • Tiger Team

  • Zombie process

  • Alice, Bob and Carol (some NPCs)

load more comments (5 replies)
[–] shasta@lemm.ee 23 points 1 month ago

Disconnect Peripheral: Removes someone's limb.

Critical Vulnerability: Increases critical hit rate.

Memory buffer: Allows you yo remember things better.

[–] Tolookah@discuss.tchncs.de 22 points 1 month ago* (last edited 1 month ago)

Artificers use assembly language to cast their spells.

1st level wild shape ability byte.
4th level wild shape ability megabyte.
8th level wild shape ability gigabyte.
9th level wild shape ability terabyte

Bonus 0th level ability: nibble

[–] rwdf@lemmy.world 21 points 1 month ago

Zero Trust: curse. You become suspicious of your allies.

[–] sexual_tomato@lemmy.dbzer0.com 21 points 1 month ago

Kernel Space - banishes the target to a plane of existence filled with corn

B Tree - an AOE summon of a permanent swarm of bees in the targeted area until the bees all die or leave naturally

Monad - device that transmutes one set of spell components into another. These can be strung together to form very complex things.

Extended Backus-Naur Form - Allows one to transform into a memetic form to be carried in the mind of another; also extends to your clothing and any carried items.

[–] SzethFriendOfNimi@lemmy.world 21 points 1 month ago* (last edited 1 month ago) (1 children)

Agile Method

Kill

Clone

Daemon Process

load more comments (1 replies)
[–] ICastFist@programming.dev 21 points 1 month ago (1 children)

Rust - rusts metal. When miscast, makes the target a crab of some sort

Go - Same as "command" spell

Regular Expression - makes any cryptic message understandable in a language you know

Transfer Protocol - allows the teleportation of one packet to a willing host

Read Only - cast on a book, scroll or any other thing with written words. Ensures no further words can be written. No scribbles or any sort of artwork will stick either. The object can still be destroyed

Icon - For a short period, the target of the spell becomes a beloved, or hated, icon of a subject. IE: beloved icon of beauty, hated icon of music.

Master Boot Record - this magical list contains all the master level boots ever created and their current whereabouts

Partition Table - allows any object with at least 2 flat sides to be cut into any shape

load more comments (1 replies)
[–] hexabs@lemmy.world 20 points 1 month ago* (last edited 1 month ago) (1 children)

Python runtime. Time for you to run from these pythons bitch.

BSOD. Pretty self-explanatory

Agile development. Raises Dex everytime a new enemy enters vision.

load more comments (1 replies)
[–] SpaceNoodle@lemmy.world 20 points 1 month ago (3 children)

Deadlock

Priority inversion

Debugging

Source compilation

load more comments (3 replies)
[–] Forbo@lemmy.ml 20 points 1 month ago
  • Ring zero
  • Bootkit/Rootkit
  • Attacker in the middle
  • Intercepting proxy
  • Daemon
[–] untorquer@lemmy.world 20 points 1 month ago (2 children)

LUT - A table appears 10ft above your target and falls on it dealing 1d6 bludgeoning.

"LOOK! UP! TABLE!"

load more comments (2 replies)
[–] runjun@lemmy.world 19 points 1 month ago (1 children)

Y’all might be interested in the book series by Charles Stross starting with The Atrocity Archives.

load more comments (1 replies)
[–] psud@aussie.zone 19 points 1 month ago (2 children)

Ping of death

Bash

Vim (clearly a buff)

load more comments (2 replies)
load more comments
view more: next ›