Computer Use in Gamma World | World Anvil

Computer Use

Intelligence, Trained only.
  Computers were present in every aspect of life before the fall of civilization. Since the Final Wars, however, computers have become rare and much coveted tools. While many remain operational in hidden bases, archivists’ communities, and technological societies, most inhabitants of the Gamma World never see a computer, let alone use one.   In the Gamma World, Computer Use is an uncommon skill that cannot be used untrained. Due to the wide variety of computer systems characters might encounter, Computer Use has been divided into several categories in a manner similar to the Craft and Knowledge skills. Unlike those skills, a character with Computer use may attempt to use a category of the skill she does not possess, but she is considered untrained. Essentially, possessing ranks in one category of Computer Use gives a character enough understanding of computer systems in general to try, while characters with no ranks in Computer Use would not even know where to begin.   The categories of Computer Use are Data and Operation Systems, Artificial Intelligence, and Biotech Systems.   Action: Computer Use requires at least a full-round action. Most situations will require more time at the GM's discretion.   Special: A character can take 10 when using the Computer Use skill. A character can take 20 in some cases, but not in those that involve a penalty for failure. (A character cannot take 20 to defeat computer security or defend security.)   A character with the Gearhead feat gets a +2 bonus on all Computer Use checks.  

Computer Use (Data and Operation Systems)

This skill encompasses the use of computer systems designed to store information and those designed to run external systems (such as weapons or remote robots).   Data is recorded on various media, either internal or external, and is accessible only using specific kinds of hardware. With this skill, a character can find data that has been hidden, encoded, deleted, or even physically destroyed, given enough time and skill.   Check: The following table lists DCs for retrieving data from a computer system. Adding information to a computer system is a simple task assuming the character is authorized to do so; it does not require a check. If the character is attempting to alter or add information to a computer system without authorization, the character must first defeat the computer’s security (see below).
  Defeat Computer Security: The DC is determined by the quality of the security program installed to defend the system. If the check is failed by 5 or more, the security system immediately alerts its administrator that there has been an unauthorized entry. An alerted administrator may attempt to identify the character or cut off the character’s access to the system.   Sometimes, when accessing a difficult site, the character has to defeat security at more than one stage of the operation. If the character beats the DC by 10 or more when attempting to defeat computer security, the character automatically succeeds at all subsequent security checks at that site until the end of the character’s session.
  Take Control of a System: In addition to modifying and retrieving data from a system, the character may attempt to take control of the system and its remote components. The DC for entering the system is based on the security level of the system, as described above. Once in the system, the character must make a second Computer Use (data and operations systems) check to modify commands sent to remote components.
 

Computer Use (Artificial Intelligence)

The skill of working with artificial intelligence (AI) is half computer operations and half psychology. Self-aware systems, ranging from security programs to synthetic life forms, operate under recognizable patterns, but also possess creativity, resourcefulness, and even impulsiveness.   Check: Computer Use (artificial intelligence) works exactly like using the Diplomacy skill except it only applies to self-aware machines. In addition, characters using this skill may attempt to reprogram an AI, effectively changing its personality to suit the programmer. The following table represents example DCs and changes that may be made.
 

Computer Use (Biotech Systems)

Due the extreme complexity of manipulating the genome (human or otherwise), specific computer systems must be used for dealing with biotech. This skill allows a character to operate such systems. It otherwise works as Computer Use (data and operation systems). Note that this skill does not impart any training in biotechnology; the skill Knowledge (earth and life sciences) must be used for that purpose.


Cover image: Trash Planet by nkabuto