this post was submitted on 28 Sep 2024
559 points (97.9% liked)

RPGMemes

10404 readers
344 users here now

Humor, jokes, memes about TTRPGs

founded 2 years ago
MODERATORS
 

Image transcription:

Computer science terms that sound like fantasy RPG abilities

I'll start:

  • Firewall
  • Virtual Memory
  • Single source of truth
  • Lossless Compression (this one sounds really powerful for some reason)

Your turn

Hard mode: Try not to include closer to domain-specific things like javascript library names

top 50 comments
sorted by: hot top controversial new old
[–] Davel23@fedia.io 158 points 2 months ago (5 children)

Scroll lock. To protect your scrolls.

load more comments (5 replies)
[–] PugJesus@lemmy.world 143 points 2 months ago (2 children)
[–] SzethFriendOfNimi@lemmy.world 46 points 2 months ago (1 children)

The orc becomes a pile of gelatin, quivering, you now must choose what it will become.

Roll for…

[–] sbv@sh.itjust.works 51 points 2 months ago (1 children)
[–] SzethFriendOfNimi@lemmy.world 31 points 2 months ago (1 children)

You roll a 1.

This causes an unauthorized access exception and a giant bouncer rapidly approaches, screaming in fury.

load more comments (1 replies)
[–] TopRamenBinLaden@sh.itjust.works 22 points 2 months ago (2 children)

Encapsulation kinda sounds like it could be a spell too. That's 2/3 pillars of OOP.

load more comments (2 replies)
[–] cowdoy@lemmy.ca 132 points 2 months ago (1 children)

World wide web would be an OP spell

[–] SzethFriendOfNimi@lemmy.world 23 points 2 months ago

A crack forms below you… and suddenly a tunnel collapses inward beneath your feet.

After a short while your fall is arrested. You are now snagged in a web, in the dim light lit from where you fell you can see this web goes on, all around you, seemingly forever.

[–] airbreather@lemmy.world 111 points 2 months ago (1 children)
[–] cerement@slrpnk.net 36 points 2 months ago (1 children)

a list of named vulnerabilities would be a great starter

[–] SzethFriendOfNimi@lemmy.world 39 points 2 months ago (1 children)

I cast CVE-2014-0160… at the darkness

load more comments (1 replies)
[–] Kolanaki@yiffit.net 94 points 2 months ago (3 children)

I am a level 17 Install Wizard.

[–] aeronmelon@lemmy.world 41 points 2 months ago (1 children)

Installation Wizard - A wizard hired to protect a specific building or location.

load more comments (1 replies)
load more comments (1 replies)
[–] Remotedeck@discuss.tchncs.de 84 points 2 months ago (1 children)
[–] WadeTheWizard@fedia.io 29 points 2 months ago

One of those fucked me up real bad in Elden Ring

[–] Dagnet@lemmy.world 74 points 2 months ago (1 children)
load more comments (1 replies)
[–] cranberryjam@lemmy.blahaj.zone 71 points 2 months ago
  • Terminal shell
  • Kill daemon
  • Timeshift
  • Cloud hosting
  • Ethernet
  • Overwrite memory
  • Free memory
  • Poison artifical intelligence
[–] drspod@lemmy.ml 58 points 2 months ago (1 children)
load more comments (1 replies)
[–] Strayce@lemmy.sdf.org 56 points 2 months ago* (last edited 2 months ago) (2 children)

Default Gateway

Split Horizon

Routing Overhead

Broadcast Storm

edit:fkn markdown

[–] rustydrd@sh.itjust.works 20 points 2 months ago

Split Horizon sounds really high-level.

load more comments (1 replies)
[–] x2Zero7@sh.itjust.works 54 points 2 months ago* (last edited 2 months ago)

Terminal escape

Privilege escalation

Command injection

[–] wilecoyote@programming.dev 52 points 2 months ago (2 children)
load more comments (1 replies)
[–] thelsim@sh.itjust.works 50 points 2 months ago* (last edited 2 months ago) (2 children)

I had a bit too much fun with these :)

Magical Items
  • The Bandwidth Cap
    Cursed item that limits the magical power of it's wearer
  • The Token Ring
    Magical ring that allows the wielder to communicate over large distances. They can receive messages from one token ring and send message to another.
  • The Memory Barrier
    Protective charm that shields the mind from intrusion.
  • The Shadow Register
    A magical ledger that records secrets and hidden locations in the immediate area.
  • The Superscalar
    A legendary shimmering sword that can strike multiple foes in a single attack.
Spells
  • Loopback
    Redirects a spell to its point of origin.
  • Jabber
    Causes the target to produce incoherent speech and lose its train of thought.
  • Branch Prediction
    Gives the caster foresight to predict their opponent's next action.
  • Traceroute
    A tracking spell that reveals the path of a target.
  • Mask
    Hides the caster's true identity.
  • Hypertransport
    Enables instantaneous movement over short distances.
  • Interrupt
    Counterspell to disrupt an enemy's casting.
Spell modifiers
  • Broadcast
    Modifies spell to affect a large area.
  • Unicast
    Modifies spell to affect a single point with maximum damage.
  • Multicast
    Modfies spell to affect multiple selected targets.
  • Repeater
    Modifies spell to recast itself over multiple turns.
load more comments (2 replies)
[–] Courantdair@jlai.lu 41 points 2 months ago (5 children)
  • Big endian (a very powerful NPC)
  • Hardware abstraction (a spell that makes all the stuff disappears)
  • Obfuscation (invisibility spell)
  • Multiplexing (ability to cast several spells as one)
  • Dangling reference (when wrong information is given by somebody)
  • Curiously Recurring Template Pattern (basically crop circles)
  • Pure virtual method (anything somebody learned but will never use)
  • Diamond inheritance (when someone in the party dies and all of their money is spread accross the others)

Can you tell what's my job?

load more comments (5 replies)
[–] Banichan@dormi.zone 41 points 2 months ago (1 children)

CAT5e sounds like a fifth-edition ruleset

[–] buh@hexbear.net 23 points 2 months ago (7 children)

ethernet sounds like some mystical realm

load more comments (7 replies)
[–] itslilith@lemmy.blahaj.zone 40 points 2 months ago (1 children)
  • Hypervisor
  • time daemon
  • privilege escalation
load more comments (1 replies)
[–] Sanctus@lemmy.world 38 points 2 months ago

Asynchronous Threads

Port Forward (this one just sounds like a dope place)

Remote Host

Domain Controller

Immutable Type

[–] outstanding_bond@mander.xyz 37 points 2 months ago (1 children)
  • rowhammer
  • rainbow table
  • global interpreter lock
  • race condition (atrocity?)
  • core dump
load more comments (1 replies)
[–] Godnroc@lemmy.world 35 points 2 months ago
[–] blibla@slrpnk.net 30 points 2 months ago (3 children)
load more comments (3 replies)
[–] thericofactor@sh.itjust.works 29 points 2 months ago (1 children)
load more comments (1 replies)
[–] MyTurtleSwimsUpsideDown@fedia.io 26 points 2 months ago (1 children)

Sanity check
Wildcard
Merge Bash Overwrite memory
Key binding
Class inheritance

load more comments (1 replies)
[–] CptBread@lemmy.world 26 points 2 months ago* (last edited 2 months ago)

Memory leak

Destructor

Dynamic dispatch

Execute

[–] xtrapoletariat@beehaw.org 25 points 2 months ago* (last edited 2 months ago) (1 children)
  • Brute Force Attack
  • Markov Chain
  • Singular Matrix
  • Pow
  • map
  • bind
  • variable name (thief's favorite)
  • Ballmer Peak
  • Fourier Transformation (2nd level: FFT)
  • Gaussian Elimination
  • Double
load more comments (1 replies)
[–] ace_garp@lemmy.world 25 points 2 months ago (5 children)
  • Race condition

  • Physical Layer

  • Fast Fourier Transform

  • COBOL

  • Penetration testing

  • Tiger Team

  • Zombie process

  • Alice, Bob and Carol (some NPCs)

load more comments (5 replies)
[–] shasta@lemm.ee 24 points 2 months ago

Disconnect Peripheral: Removes someone's limb.

Critical Vulnerability: Increases critical hit rate.

Memory buffer: Allows you yo remember things better.

[–] Tolookah@discuss.tchncs.de 24 points 2 months ago* (last edited 2 months ago)

Artificers use assembly language to cast their spells.

1st level wild shape ability byte.
4th level wild shape ability megabyte.
8th level wild shape ability gigabyte.
9th level wild shape ability terabyte

Bonus 0th level ability: nibble

[–] sexual_tomato@lemmy.dbzer0.com 23 points 2 months ago

Kernel Space - banishes the target to a plane of existence filled with corn

B Tree - an AOE summon of a permanent swarm of bees in the targeted area until the bees all die or leave naturally

Monad - device that transmutes one set of spell components into another. These can be strung together to form very complex things.

Extended Backus-Naur Form - Allows one to transform into a memetic form to be carried in the mind of another; also extends to your clothing and any carried items.

[–] rwdf@lemmy.world 22 points 2 months ago

Zero Trust: curse. You become suspicious of your allies.

[–] SzethFriendOfNimi@lemmy.world 22 points 2 months ago* (last edited 2 months ago) (1 children)

Agile Method

Kill

Clone

Daemon Process

load more comments (1 replies)
[–] ICastFist@programming.dev 22 points 2 months ago (1 children)

Rust - rusts metal. When miscast, makes the target a crab of some sort

Go - Same as "command" spell

Regular Expression - makes any cryptic message understandable in a language you know

Transfer Protocol - allows the teleportation of one packet to a willing host

Read Only - cast on a book, scroll or any other thing with written words. Ensures no further words can be written. No scribbles or any sort of artwork will stick either. The object can still be destroyed

Icon - For a short period, the target of the spell becomes a beloved, or hated, icon of a subject. IE: beloved icon of beauty, hated icon of music.

Master Boot Record - this magical list contains all the master level boots ever created and their current whereabouts

Partition Table - allows any object with at least 2 flat sides to be cut into any shape

load more comments (1 replies)
[–] Forbo@lemmy.ml 22 points 2 months ago
  • Ring zero
  • Bootkit/Rootkit
  • Attacker in the middle
  • Intercepting proxy
  • Daemon
[–] untorquer@lemmy.world 21 points 2 months ago (2 children)

LUT - A table appears 10ft above your target and falls on it dealing 1d6 bludgeoning.

"LOOK! UP! TABLE!"

load more comments (2 replies)
[–] psud@aussie.zone 20 points 2 months ago (2 children)

Ping of death

Bash

Vim (clearly a buff)

load more comments (2 replies)
[–] hexabs@lemmy.world 20 points 2 months ago* (last edited 2 months ago) (1 children)

Python runtime. Time for you to run from these pythons bitch.

BSOD. Pretty self-explanatory

Agile development. Raises Dex everytime a new enemy enters vision.

load more comments (1 replies)
[–] SpaceNoodle@lemmy.world 20 points 2 months ago (3 children)

Deadlock

Priority inversion

Debugging

Source compilation

load more comments (3 replies)
[–] runjun@lemmy.world 19 points 2 months ago (1 children)

Y’all might be interested in the book series by Charles Stross starting with The Atrocity Archives.

load more comments (1 replies)
load more comments
view more: next ›