This HTML5 document contains 38 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n37http://dbkwik.webdatacommons.org/resource/57j9yLZO24H-tsLcWW7_Qg==
n18http://dbkwik.webdatacommons.org/resource/F-23i-cJ5tyB2JLyRl4z6w==
n40http://dbkwik.webdatacommons.org/resource/m5268hoCy0FopVdhvAYd7w==
n43http://dbkwik.webdatacommons.org/resource/pHJWhXACWCBmdF09ZHUEmA==
n26http://dbkwik.webdatacommons.org/resource/299mJLeUioMjuDGUiCqmGQ==
n31http://dbkwik.webdatacommons.org/resource/SZ1bJMvHHpOXCVt5r8aM6A==
n20http://dbkwik.webdatacommons.org/resource/WcNZO40U1fx7_q4ftnmuiQ==
n44http://dbkwik.webdatacommons.org/resource/TLlg6JbBTUzeNdo4H-isaQ==
n16http://dbkwik.webdatacommons.org/resource/ZERyeRuBBSbkexvn6m5uDQ==
n10http://dbkwik.webdatacommons.org/resource/JIMRUQ-_IpWQOH8RHqVAfQ==
n30http://dbkwik.webdatacommons.org/resource/7fy5WeNxb5-Va8IiVCMkow==
n32http://dbkwik.webdatacommons.org/resource/Uvh53lg3bvx7UbTeybfFYg==
n36http://dbkwik.webdatacommons.org/resource/ixS-W2SMnQqqMmo-zWWK6w==
dctermshttp://purl.org/dc/terms/
n11http://dbkwik.webdatacommons.org/resource/hOJbAMxRksh3KXuT8s9l8w==
rdfshttp://www.w3.org/2000/01/rdf-schema#
n13http://dbkwik.webdatacommons.org/resource/F4UR7PIf3z271yG1bOkEDg==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n8http://dbkwik.webdatacommons.org/resource/1-Eh5zK97gD-aJmSl2GwBQ==
n14http://dbkwik.webdatacommons.org/resource/YtXsK4XT3tA9l9pv8kMytQ==
xsdhhttp://www.w3.org/2001/XMLSchema#
n29http://dbkwik.webdatacommons.org/resource/Ya68Wr_msVkJXeW0t1NJfQ==
n27http://dbkwik.webdatacommons.org/resource/11KTi0y9pGoRs6NE9LTgaQ==
n19http://dbkwik.webdatacommons.org/resource/c6Wa3RnwsmKw5oquq7vASg==
n22http://dbkwik.webdatacommons.org/resource/Tuzsa3CDLJKgO_fVVPGC9A==
n21http://dbkwik.webdatacommons.org/resource/sbj47hntPZb-o3sBvC-rvA==
n25http://dbkwik.webdatacommons.org/resource/D3xmK03hIBNc676_1ClhXQ==
n5http://dbkwik.webdatacommons.org/tron/property/
n15http://dbkwik.webdatacommons.org/resource/3j-bqP5zNIEx4Q37RvQ2_Q==
n42http://dbkwik.webdatacommons.org/resource/oeamX_W8An3XgRCT7bneGw==
n39http://dbkwik.webdatacommons.org/resource/QUEH9WcOD8pZSGABr-nrJA==
n17http://dbkwik.webdatacommons.org/resource/ARN-bGBDutKOXSMzFlKVVQ==
n4http://dbkwik.webdatacommons.org/resource/TbRgm8e4U-3vVmFZW1Tauw==
n33http://dbkwik.webdatacommons.org/resource/i_lNMrFXEIoHUSI3TaqIJg==
n41http://dbkwik.webdatacommons.org/resource/06AnuVMgOj6LfEUtEEJPAQ==
n12http://dbkwik.webdatacommons.org/resource/BbSncYiy-BPxaupjDyPKgA==
n38http://dbkwik.webdatacommons.org/resource/3zNjRdkgB9Saw16CZaKddA==
n35http://dbkwik.webdatacommons.org/ontology/
n23http://dbkwik.webdatacommons.org/resource/qvjyQE43f-t0ujtmJtI_Tg==
n9http://dbkwik.webdatacommons.org/resource/QOiHI65D1hgrGLRWDIQNKw==
n2http://dbkwik.webdatacommons.org/resource/HxRJ1gPvujxdSZ_0hNNQpw==
n3http://dbkwik.webdatacommons.org/resource/g02zRC4Q2rw45XcA0mHs4A==
n6http://dbkwik.webdatacommons.org/resource/mudsUJhli5HFoTdRklm1_g==
n28http://dbkwik.webdatacommons.org/resource/l4jMe9Xk7qUQQxHDsVXGKw==
n24http://dbkwik.webdatacommons.org/resource/kQl6q_MKvLIb1g1rCeWBHg==
Subject Item
n26:
n27:
n2:
Subject Item
n37:
n38:
n2:
Subject Item
n2:
rdf:type
n12:
rdfs:label
System Monitor
rdfs:comment
A System Monitor is a security program tasked with maintaining system integrity from internal threats such as gridbugs, rogue programs and viruses. Flynn copied Tron, a security program from the ENCOM mainframe, to the TRON system to act as head of system security and maintain order. After the emergence of the ISOs, Clu and several system monitors performed terrorist attacks against ISO-populated areas of the Grid. Despite this, most system monitors continued to perform their role of protecting the TRON system. When the Abraxas virus was unleashed, the system monitors were quickly repurposed into sentries and sent to fight against infected programs.
dcterms:subject
n8: n10: n11: n17: n18: n23: n24: n28: n41: n43:
n15:
n16: n20: n29: n30:
n5:wikiPageUsesTemplate
n6: n22: n39:
n38:
Security
n40:
System Monitor
n31:
True
n13:
n14: n21: n25: Black Guards n33:
n3:
n4: n19: n44:
n32:
Blue , Red , White
n36:
n26: n42:
n9:
Male
n35:abstract
A System Monitor is a security program tasked with maintaining system integrity from internal threats such as gridbugs, rogue programs and viruses. Flynn copied Tron, a security program from the ENCOM mainframe, to the TRON system to act as head of system security and maintain order. After the emergence of the ISOs, Clu and several system monitors performed terrorist attacks against ISO-populated areas of the Grid. Despite this, most system monitors continued to perform their role of protecting the TRON system. When the Abraxas virus was unleashed, the system monitors were quickly repurposed into sentries and sent to fight against infected programs. Following the coup d'état against Kevin Flynn, the system monitors, now known as sentries, acted as Clu's personal military force to control the Grid's populace. Known system monitors include: * Tron/Rinzler * Anon * Beck