About: Jack-In-The-Box Data Compression Subroutines   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

Jack-In-The-Box Data Compression Subroutines was a complex system which was used in case encrypted, volatile or essential files/programs/logs et al. were attempted to be accessed. Jack-In-The-Box Data Compression Subroutines were made up of 5.3 teraquads (5,300,000,000,000 quads) of non-essential and insignificant info which was compressed in what looked like a 1.3 megaquad file. They were masked under a multitude of names, based off of the situation. These names are based off of the intent of the enemy, retrieval of orders, retrieving confidential files on technologies or ship functions etc.

AttributesValues
rdfs:label
  • Jack-In-The-Box Data Compression Subroutines
rdfs:comment
  • Jack-In-The-Box Data Compression Subroutines was a complex system which was used in case encrypted, volatile or essential files/programs/logs et al. were attempted to be accessed. Jack-In-The-Box Data Compression Subroutines were made up of 5.3 teraquads (5,300,000,000,000 quads) of non-essential and insignificant info which was compressed in what looked like a 1.3 megaquad file. They were masked under a multitude of names, based off of the situation. These names are based off of the intent of the enemy, retrieval of orders, retrieving confidential files on technologies or ship functions etc.
dbkwik:memory-gamm...iPageUsesTemplate
Speed
  • Downloading 2.3 megaquads of info per second
Status
  • In Use
Affiliation
Type
  • Unauthorized Access Counteractive
Caption
  • The J-I-T-BDCS being tested
comm
  • Activated on stardate 152253.9
Mass
  • 5(xsd:double)
abstract
  • Jack-In-The-Box Data Compression Subroutines was a complex system which was used in case encrypted, volatile or essential files/programs/logs et al. were attempted to be accessed. Jack-In-The-Box Data Compression Subroutines were made up of 5.3 teraquads (5,300,000,000,000 quads) of non-essential and insignificant info which was compressed in what looked like a 1.3 megaquad file. They were masked under a multitude of names, based off of the situation. These names are based off of the intent of the enemy, retrieval of orders, retrieving confidential files on technologies or ship functions etc. As seen in the image above, J-I-T-BDCS fills up the LCARS console with a fast moving incomprehensible slur of data, the computer interface is intentionally sabotaged to grind to a halt due to a extensive distribution of information. So as seen in read, the computer shuts down and so does all adjacent LCARS. Trying to access one of these files leads to further and even more extensive complications.
is Defenses of
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software