This HTML5 document contains 34 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n10http://dbkwik.webdatacommons.org/resource/9L_m8L5FJAY5NObse1mVkw==
n33http://dbkwik.webdatacommons.org/resource/whfdYW1M5poJMo-bOqttZA==
n37http://dbkwik.webdatacommons.org/resource/zfhZylesKGBCenX4MbBrzw==
n17http://dbkwik.webdatacommons.org/resource/n8JMJRkF33JazycF7sbhxg==
n4http://dbkwik.webdatacommons.org/resource/FfG3ZXU44OR0KyIMqzCD7A==
n12http://dbkwik.webdatacommons.org/resource/m5268hoCy0FopVdhvAYd7w==
n34http://dbkwik.webdatacommons.org/resource/SZ1bJMvHHpOXCVt5r8aM6A==
n6http://dbkwik.webdatacommons.org/resource/dKBacg-zDQ9kM6YFGgFTTw==
n36http://dbkwik.webdatacommons.org/resource/JIMRUQ-_IpWQOH8RHqVAfQ==
n30http://dbkwik.webdatacommons.org/resource/l67DYulDbJJtRrZfhTzeEA==
n31http://dbkwik.webdatacommons.org/resource/y3vtkf5N_qdoJpiRUX00RQ==
n39http://dbkwik.webdatacommons.org/resource/Uvh53lg3bvx7UbTeybfFYg==
n8http://dbkwik.webdatacommons.org/resource/nvsrttoP2li_4MWD_hSK-w==
n26http://dbkwik.webdatacommons.org/resource/ixS-W2SMnQqqMmo-zWWK6w==
dctermshttp://purl.org/dc/terms/
n35http://dbkwik.webdatacommons.org/resource/UfQJqGJ86UPqRn-80KPCSQ==
rdfshttp://www.w3.org/2000/01/rdf-schema#
n3http://dbkwik.webdatacommons.org/resource/F4UR7PIf3z271yG1bOkEDg==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n28http://dbkwik.webdatacommons.org/resource/1RK3VPpRJggHbHRdnorupw==
n7http://dbkwik.webdatacommons.org/resource/eXtFSUEV7a1KKzeqvTpFUA==
xsdhhttp://www.w3.org/2001/XMLSchema#
n32http://dbkwik.webdatacommons.org/resource/dmz1I5BVwmz9PI3VUuVyJw==
n23http://dbkwik.webdatacommons.org/resource/Tuzsa3CDLJKgO_fVVPGC9A==
n22http://dbkwik.webdatacommons.org/tron/property/
n13http://dbkwik.webdatacommons.org/resource/3j-bqP5zNIEx4Q37RvQ2_Q==
n40http://dbkwik.webdatacommons.org/resource/6mNd2mz09R2VwDdXsqjtzg==
n14http://dbkwik.webdatacommons.org/resource/BIfYWd9k7Z5U2CvYvEjDpw==
n27http://dbkwik.webdatacommons.org/resource/JCtZNX9Iq6xznF9lX5H2fw==
n2http://dbkwik.webdatacommons.org/resource/2NhpSUbxZYk_RgclgAG94w==
n21http://dbkwik.webdatacommons.org/resource/FeTroECprwaj8FkSdzS8iw==
n20http://dbkwik.webdatacommons.org/resource/2vCVOV56wDVk03kQjTpXcw==
n24http://dbkwik.webdatacommons.org/resource/6ZP8aQUjMQRqqplD6VcN4w==
n38http://dbkwik.webdatacommons.org/resource/X3CR4brb2FbwSjg2QWI6ng==
n18http://dbkwik.webdatacommons.org/resource/BbSncYiy-BPxaupjDyPKgA==
n9http://dbkwik.webdatacommons.org/ontology/
n16http://dbkwik.webdatacommons.org/resource/3zNjRdkgB9Saw16CZaKddA==
n15http://dbkwik.webdatacommons.org/resource/qvjyQE43f-t0ujtmJtI_Tg==
n25http://dbkwik.webdatacommons.org/resource/QOiHI65D1hgrGLRWDIQNKw==
n19http://dbkwik.webdatacommons.org/resource/aSRTvOcBYAaSORjXrmqYHw==
n29http://dbkwik.webdatacommons.org/resource/kGs6F-mdtvqRK_tP9Z8iPg==
Subject Item
n2:
rdf:type
n18:
rdfs:label
DataWraith
rdfs:comment
DataWraiths are digitized elite hacker users that were used by fCon to create havoc in computer systems around the world, steal top-secret data, and destroy the databases of fCon's competitors. When they derez in the computer world they are kicked out of the computer and return to their original human form, unconscious. They use Mesh-type weapons against Jet Bradley, such as the Mesh Primitive. They seem to attack Jet and then disappear, only to reappear to attack. They also have superior speed and run very fast from one part of the map to another. They are fast enough to dodge attacks.
dcterms:subject
n6: n7: n8: n10: n15: n19: n21: n28: n30: n35: n36: n37: n40:
n13:
n14:
n22:wikiPageUsesTemplate
n23: n32:
n16:
Hacking, data theft
n12:
Datawraiths
n34:
True
n24:
Purple hacking program
n3:
n4: n17: n20: n29: n33:
n39:
Purple
n26:
n27:
n25:
Variable
n38:
Various
n31:
Various
n9:abstract
DataWraiths are digitized elite hacker users that were used by fCon to create havoc in computer systems around the world, steal top-secret data, and destroy the databases of fCon's competitors. When they derez in the computer world they are kicked out of the computer and return to their original human form, unconscious. They use Mesh-type weapons against Jet Bradley, such as the Mesh Primitive. They seem to attack Jet and then disappear, only to reappear to attack. They also have superior speed and run very fast from one part of the map to another. They are fast enough to dodge attacks.