This HTML5 document contains 20 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n22http://dbkwik.webdatacommons.org/resource/rkTaudfazPqz2HAHy6y4fw==
n10http://dbkwik.webdatacommons.org/resource/-ulDv02BDSEO6PKJ8EokXw==
n19http://dbkwik.webdatacommons.org/resource/_94rCCIQPbjhKkoi3asLYA==
n20http://dbkwik.webdatacommons.org/ontology/
dctermshttp://purl.org/dc/terms/
n15http://dbkwik.webdatacommons.org/resource/Emlj-lLqpVBhg_EFQMhEpA==
n17http://dbkwik.webdatacommons.org/resource/ybDVPlXxguAfBKWyKlbxDQ==
n2http://dbkwik.webdatacommons.org/resource/fbbfhElQyUl6pPIBDAQ4MQ==
n6http://dbkwik.webdatacommons.org/resource/7fAfRYIFav_Q4ylAYVXTDA==
n12http://dbkwik.webdatacommons.org/resource/NPzt2Guj92wyUVyQR-LrwQ==
rdfshttp://www.w3.org/2000/01/rdf-schema#
n13http://dbkwik.webdatacommons.org/resource/xoykDFxJFBgF02W_HRnEzw==
n18http://dbkwik.webdatacommons.org/resource/TgOVbXtoSofCtrjpr1F5Hw==
n14http://dbkwik.webdatacommons.org/resource/9QoHp560f0X9eeMsR7N4Vg==
n11http://dbkwik.webdatacommons.org/resource/EW1bJq3W_W7cdIpAD2X4sw==
n5http://dbkwik.webdatacommons.org/resource/I-JVerANfu-5L7bXVu8i-Q==
n7http://dbkwik.webdatacommons.org/resource/dq5BXkyK2a8gi5bEnOnaaw==
n8http://dbkwik.webdatacommons.org/resource/EIEW5sIxzGsFHnB2L_wetQ==
n23http://dbkwik.webdatacommons.org/resource/-vyOJcy-qX3zDqjznLpOWw==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n21http://dbkwik.webdatacommons.org/powerlisting/property/
n16http://dbkwik.webdatacommons.org/resource/2_BOtlZONuFtW24JzHKNqQ==
n9http://dbkwik.webdatacommons.org/resource/GTMTU1uECQhyO8e8Aao1MA==
xsdhhttp://www.w3.org/2001/XMLSchema#
Subject Item
n2:
rdf:type
n13:
rdfs:label
Technique Reading
rdfs:comment
User can read/see/view any and all attacks and techniques a target has, including techniques that are Hidden, Invisible, accelerated, and even incomplete (ie only part of attack/technique is performed). This can allow them to anticipate what attacks an opponent will use and even how to dodge or block it, some users can even use this power to copy and nullify their opponents techniques.
dcterms:subject
n5: n6: n8: n10: n11: n12: n14: n15: n17:
n9:
Read the attacks/techniques of anyone.
n7:
Power/Ability to:
n16:
Technique Reading
n18:
Relm Arrowny can read the techniques and attacks of any monster via the "Fake Mustache" relic.
n21:wikiPageUsesTemplate
n22:
n19:
300
n23:
goldenrod
n20:abstract
User can read/see/view any and all attacks and techniques a target has, including techniques that are Hidden, Invisible, accelerated, and even incomplete (ie only part of attack/technique is performed). This can allow them to anticipate what attacks an opponent will use and even how to dodge or block it, some users can even use this power to copy and nullify their opponents techniques.