This HTML5 document contains 78 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n45http://dbkwik.webdatacommons.org/resource/Yi5ZcqXrhALSCZiNzuw03w==
n36http://dbkwik.webdatacommons.org/resource/rfXvzJzXKDnrGH6CCkn99A==
n79http://dbkwik.webdatacommons.org/resource/Sd2EcuGXFL8atF6PRqtoJQ==
n60http://dbkwik.webdatacommons.org/resource/vXF0-CuLyRT5z_owt-6uUA==
n59http://dbkwik.webdatacommons.org/resource/zVq5tPBivTMXvRu6M3VJzQ==
n44http://dbkwik.webdatacommons.org/resource/m5268hoCy0FopVdhvAYd7w==
n39http://dbkwik.webdatacommons.org/resource/EW1bJq3W_W7cdIpAD2X4sw==
n62http://dbkwik.webdatacommons.org/resource/KdVpNq9fzKRoKqHkqXa2DA==
n48http://dbkwik.webdatacommons.org/resource/Qw4U_apXeiE27YLKSYHY-Q==
n15http://dbkwik.webdatacommons.org/resource/jAkJ_dbR8Fs3TQJwmdRMWg==
n58http://dbkwik.webdatacommons.org/resource/LInXnuvs6kF22NQYBeZCqw==
n17http://dbkwik.webdatacommons.org/resource/ide9bsPn_CfFkgs9D0C4bQ==
n43http://dbkwik.webdatacommons.org/resource/GTMTU1uECQhyO8e8Aao1MA==
n16http://dbkwik.webdatacommons.org/resource/VWCeLOwju70VQ59oa8kitg==
n74http://dbkwik.webdatacommons.org/resource/P8jKdsC1xkFB0tl-bfON0A==
n20http://dbkwik.webdatacommons.org/resource/rkTaudfazPqz2HAHy6y4fw==
n41http://dbkwik.webdatacommons.org/resource/RiaMY-W7ua567zJeXjY1LA==
n52http://dbkwik.webdatacommons.org/resource/YrpRTP833VfvICWfVx-EyQ==
n21http://dbkwik.webdatacommons.org/resource/_94rCCIQPbjhKkoi3asLYA==
n61http://dbkwik.webdatacommons.org/resource/dd6f4L_jxjPW_PsYQH275w==
n69http://dbkwik.webdatacommons.org/resource/2mJunOd-UC3QRD-d4g-8Cw==
n73http://dbkwik.webdatacommons.org/resource/StnTY7ohXrf9a02xy9EqHw==
n14http://dbkwik.webdatacommons.org/resource/YOGmf1Q1FIHEPXfH2rCwDQ==
n37http://dbkwik.webdatacommons.org/resource/Emlj-lLqpVBhg_EFQMhEpA==
n78http://dbkwik.webdatacommons.org/resource/JGYjNLEa5KumAcy05mc9Dw==
n71http://dbkwik.webdatacommons.org/resource/uCw86PVd7wnFvb3W04EVqw==
n51http://dbkwik.webdatacommons.org/resource/PUbdCHoThNub4ek5F7cnkA==
n56http://dbkwik.webdatacommons.org/resource/j3ehkmUbJqTDo3Xw0F2IBQ==
n26http://dbkwik.webdatacommons.org/resource/Mhj_RaCsnSYELQQFfOks4Q==
dctermshttp://purl.org/dc/terms/
n53http://dbkwik.webdatacommons.org/resource/JOkU1icrCbfVFjJfWu9ZoQ==
n35http://dbkwik.webdatacommons.org/resource/LmDB65F1P8Sc2F5N6egj1A==
n42http://dbkwik.webdatacommons.org/resource/JchM0h8zp5hZjOcUN_KYdg==
rdfshttp://www.w3.org/2000/01/rdf-schema#
n22http://dbkwik.webdatacommons.org/resource/U3BiH7nz_7DAD_y_Gi0p9g==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n13http://dbkwik.webdatacommons.org/resource/144zxvqmU_Jwu2YWNIAqnw==
n65http://dbkwik.webdatacommons.org/resource/DqDX4kJG3bdD-6gP9JZtfA==
n30http://dbkwik.webdatacommons.org/resource/2_BOtlZONuFtW24JzHKNqQ==
n72http://dbkwik.webdatacommons.org/resource/wsBwA9-wSKnWSMkriOOomw==
n57http://dbkwik.webdatacommons.org/resource/YVds5uixw9XdpOY0c7Oxmw==
n33http://dbkwik.webdatacommons.org/resource/Rjak28-PzHzOb-2KGF27JQ==
xsdhhttp://www.w3.org/2001/XMLSchema#
n80http://dbkwik.webdatacommons.org/resource/ZENmiq3YA8Huy7Hy7queAw==
n38http://dbkwik.webdatacommons.org/resource/KcCDqhgQ3VC1_m4xRtsWng==
n2http://dbkwik.webdatacommons.org/resource/ibqJIEgeVnGxs_wtrO7iKA==
n64http://dbkwik.webdatacommons.org/resource/TM1mJ-JqQ9bySPbJ7j-QIQ==
n49http://dbkwik.webdatacommons.org/resource/wGP00T4YXQUVFcOR5n9_3A==
n68http://dbkwik.webdatacommons.org/resource/c_Qk-lIrXcgAKM4mM4wwOw==
n76http://dbkwik.webdatacommons.org/resource/TgOVbXtoSofCtrjpr1F5Hw==
n32http://dbkwik.webdatacommons.org/resource/N0fv-lZ3DbRuQA6JZYMFAA==
n70http://dbkwik.webdatacommons.org/resource/VPlJCbhvXgYsYM5nNN8i4Q==
n50http://dbkwik.webdatacommons.org/resource/QxAQuxJJAR8LtMQHo8-2kg==
n66http://dbkwik.webdatacommons.org/resource/a8kBYetfn-ilMpexzV02rA==
n54http://dbkwik.webdatacommons.org/resource/B-N_gvBwgfN6Ta77EvAlEg==
n46http://dbkwik.webdatacommons.org/resource/iBLZB4UOS2vU0LRlOCVFMA==
n11http://dbkwik.webdatacommons.org/resource/Ejx4mw_n2p3VZx_YpJMAVA==
n55http://dbkwik.webdatacommons.org/resource/-vyOJcy-qX3zDqjznLpOWw==
n67http://dbkwik.webdatacommons.org/resource/Ip3As7TfRUmPeOPe7rZknw==
n6http://dbkwik.webdatacommons.org/harry-potter/property/
n5http://dbkwik.webdatacommons.org/resource/C0xVyjo42UqjuFE2CyR5Qg==
n19http://dbkwik.webdatacommons.org/powerlisting/property/
n75http://dbkwik.webdatacommons.org/resource/xoykDFxJFBgF02W_HRnEzw==
n81http://dbkwik.webdatacommons.org/resource/tVY8GAKpFGuuGudJ6fnjnQ==
n47http://dbkwik.webdatacommons.org/resource/X-1ZfMAs3Q3W4OV6HsLcfA==
n3http://dbkwik.webdatacommons.org/resource/HcRZysteCVx4GAi5RjMd3A==
n27http://dbkwik.webdatacommons.org/resource/iPckiiXd6CKNhgp1rpHlLg==
n25http://dbkwik.webdatacommons.org/resource/7fAfRYIFav_Q4ylAYVXTDA==
n10http://dbkwik.webdatacommons.org/resource/d23-o38Jxc2Nfyc6Vl6gFA==
n18http://dbkwik.webdatacommons.org/ontology/
n77http://dbkwik.webdatacommons.org/resource/tFhDbuGx2gXVCxYXhto_FQ==
n24http://dbkwik.webdatacommons.org/resource/hsfKwLImc8RD49KIaCmyPw==
n63http://dbkwik.webdatacommons.org/resource/YZMb1OhVwA1a2woY70nmkQ==
n40http://dbkwik.webdatacommons.org/resource/dq5BXkyK2a8gi5bEnOnaaw==
n28http://dbkwik.webdatacommons.org/resource/n9xP8hznAW_YMuLAtWGRHA==
n4http://dbkwik.webdatacommons.org/harrypotter/property/
n23http://dbkwik.webdatacommons.org/resource/hQstwcJJmrTsIqxvQT5T8w==
n9http://dbkwik.webdatacommons.org/resource/RKIJwW4M2j7gc2o36fzE6g==
n7http://dbkwik.webdatacommons.org/resource/rHJ4CjqJdtuZvoFQpMr9ew==
n31http://dbkwik.webdatacommons.org/resource/KA7LfkYOWD5LtEqDlLGvCA==
n34http://dbkwik.webdatacommons.org/resource/5h1JnSSyKEStj-ha3sL4Jg==
n29http://dbkwik.webdatacommons.org/resource/su4oAXP4c6rPg-OtFLXidA==
Subject Item
n2:
rdf:type
n3: n75:
rdfs:label
Sacrificial protection Sacrificial Protection
rdfs:comment
User can give their lives to shield others from harm, be it a life-threatening disease or injury or an apocalyptic force or event. This can be done either by using a specialized ability or ritual that will inevitably kill the user or by overusing one's natural capabilities until the strain on their bodies becomes fatal. Death can occur immediately after the power is activated or at some later point, and the protection offered can either be defensive in nature (i.e. a protective charm/barrier that prevents harm or teleporting those the user wants to protect to another location) or offensive in nature (i.e. unleashing immense power/energy to seal or obliterate a dangerous entity). The duration of the protection can either be momentary, ending shortly after the user has died, or can last for Sacrificial protection is an ancient, powerful, and long-lasting counter-charm. This charm unlike others has no incantation and is endowed when one person (who we will call "the victim" for purposes of this article) ultimately sacrifices his or her own life willingly and out of deep and pure love to save the life of one or more people (to whom this article will refer as "beneficiaries").
dcterms:subject
n13: n15: n22: n25: n27: n33: n35: n37: n38: n39: n45: n47: n57: n59: n63: n68: n69: n70: n71: n73:
n43:
Protect others at the cost of your own life.
n40:
Power/Ability to:
n6:wikiPageUsesTemplate
n7: n9: n17: n23: n24: n29: n31: n36: n46: n48: n49: n56: n61: n65: n66: n74: n77: n78:
n4:wikiPageUsesTemplate
n5: n10: n11: n14: n16: n28: n34: n50: n51: n52: n53: n54: n58: n64: n67: n79: n80: n81:
n30:
Sacrifical Protection
n44:
Sacrificial Protection
n41:
n42:
n76:
The Final Aeon is the only reliable method to defeat Sin and can only be summoned at the cost of the summoner's life.
n19:wikiPageUsesTemplate
n20: n26:
n21:
400
n32:
Deliberately shield target with body from intended curse
n55:
black
n60:
None
n72:
Powerful and long-lasting counter-charm
n62:
None
n18:abstract
User can give their lives to shield others from harm, be it a life-threatening disease or injury or an apocalyptic force or event. This can be done either by using a specialized ability or ritual that will inevitably kill the user or by overusing one's natural capabilities until the strain on their bodies becomes fatal. Death can occur immediately after the power is activated or at some later point, and the protection offered can either be defensive in nature (i.e. a protective charm/barrier that prevents harm or teleporting those the user wants to protect to another location) or offensive in nature (i.e. unleashing immense power/energy to seal or obliterate a dangerous entity). The duration of the protection can either be momentary, ending shortly after the user has died, or can last for much longer periods of time, possibly even for all eternity. Depending on the power level of the user, along with the nature of the protection in relation to the threat it is being used against, the number of people that can be protected can be anywhere from an individual person/small group of people to a nation or continent to a whole planet or even an entire galaxy or universe. It may even be possible for immortal beings to use this power if they can sacrifice their immortality (which will eventually make them die from natural causes). Sacrificial protection is an ancient, powerful, and long-lasting counter-charm. This charm unlike others has no incantation and is endowed when one person (who we will call "the victim" for purposes of this article) ultimately sacrifices his or her own life willingly and out of deep and pure love to save the life of one or more people (to whom this article will refer as "beneficiaries"). When the person to make the sacrifice dies, the counter-charm is so powerful that the murderer can not physically touch the intended victim, as the protection lives on in their veins. Also, any spells cast on the beneficiaries wear off quickly.