Jack-In-The-Box Data Compression Subroutines was a complex system which was used in case encrypted, volatile or essential files/programs/logs et al. were attempted to be accessed. Jack-In-The-Box Data Compression Subroutines were made up of 5.3 teraquads (5,300,000,000,000 quads) of non-essential and insignificant info which was compressed in what looked like a 1.3 megaquad file. They were masked under a multitude of names, based off of the situation. These names are based off of the intent of the enemy, retrieval of orders, retrieving confidential files on technologies or ship functions etc.
Attributes | Values |
---|
rdfs:label
| - Jack-In-The-Box Data Compression Subroutines
|
rdfs:comment
| - Jack-In-The-Box Data Compression Subroutines was a complex system which was used in case encrypted, volatile or essential files/programs/logs et al. were attempted to be accessed. Jack-In-The-Box Data Compression Subroutines were made up of 5.3 teraquads (5,300,000,000,000 quads) of non-essential and insignificant info which was compressed in what looked like a 1.3 megaquad file. They were masked under a multitude of names, based off of the situation. These names are based off of the intent of the enemy, retrieval of orders, retrieving confidential files on technologies or ship functions etc.
|
dbkwik:memory-gamm...iPageUsesTemplate
| |
Speed
| - Downloading 2.3 megaquads of info per second
|
Status
| |
Affiliation
| |
Type
| - Unauthorized Access Counteractive
|
Caption
| - The J-I-T-BDCS being tested
|
comm
| - Activated on stardate 152253.9
|
Mass
| |
abstract
| - Jack-In-The-Box Data Compression Subroutines was a complex system which was used in case encrypted, volatile or essential files/programs/logs et al. were attempted to be accessed. Jack-In-The-Box Data Compression Subroutines were made up of 5.3 teraquads (5,300,000,000,000 quads) of non-essential and insignificant info which was compressed in what looked like a 1.3 megaquad file. They were masked under a multitude of names, based off of the situation. These names are based off of the intent of the enemy, retrieval of orders, retrieving confidential files on technologies or ship functions etc. As seen in the image above, J-I-T-BDCS fills up the LCARS console with a fast moving incomprehensible slur of data, the computer interface is intentionally sabotaged to grind to a halt due to a extensive distribution of information. So as seen in read, the computer shuts down and so does all adjacent LCARS. Trying to access one of these files leads to further and even more extensive complications.
|
is Defenses
of | |