About: Cover All Your Bases (Episode 4.1)   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

Flood informs some Merovingian operatives that some loyal programs are under attack and sends them immediately to resolve the situation. Arriving at the target site, the Merovingian operatives face off against a group of Zion attackers. The operatives arrive at the third location and find Machine programs are the attackers, and many Merovingian programs have already fallen to the attackers. The programs are no match for the operatives and are swiftly sent back to the source. iRomav 01-21-2006, 12:03 AM

AttributesValues
rdfs:label
  • Cover All Your Bases (Episode 4.1)
rdfs:comment
  • Flood informs some Merovingian operatives that some loyal programs are under attack and sends them immediately to resolve the situation. Arriving at the target site, the Merovingian operatives face off against a group of Zion attackers. The operatives arrive at the third location and find Machine programs are the attackers, and many Merovingian programs have already fallen to the attackers. The programs are no match for the operatives and are swiftly sent back to the source. iRomav 01-21-2006, 12:03 AM
dcterms:subject
dbkwik:matrixonlin...iPageUsesTemplate
abstract
  • Flood informs some Merovingian operatives that some loyal programs are under attack and sends them immediately to resolve the situation. Arriving at the target site, the Merovingian operatives face off against a group of Zion attackers. Once the Zion operatives were defeated, Flood contacted the Merovingian operatives to inform them another location was under attack. Once again the Zion attackers are killed. One of the injured Merovingian programs recovers a disk from a computer which he demands must reach the Merovingian. The operatives upload the disk at a hardline, which allows Flood to discover another location is under attack. The operatives arrive at the third location and find Machine programs are the attackers, and many Merovingian programs have already fallen to the attackers. The programs are no match for the operatives and are swiftly sent back to the source. iRomav 01-21-2006, 12:03 AM This article is a . You can help My English Wiki by expanding it. * Episode 4.1: I think we can do business
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software