OpenLink Software

Usage stats on Cipher of Meribah

 Permalink

an Entity in Data Space: 134.155.108.49:8890

Moving walls had to be avoided. However, some walls could be broken. Sand traps could be blown away, and fire could be blown out for a short time. Blocks could be moved to open passages or block spike pits. Blades could be used to split the bead into two, allowing the water to enter narrow passages. Green switches opened up passages which came in two types: large and small. The larger switch was activated by the bead, while the smaller switches could only be activated by the smaller split beads. Often two small switches had to be activated at the same time by both small beads. Another type of switch linked two ciphers and would activate traps on another cipher.

Graph IRICount
http://dbkwik.webdatacommons.org9
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] This material is Open Knowledge Creative Commons License Valid XHTML + RDFa
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Copyright © 2009-2012 OpenLink Software