This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
gtx [2012/05/20 10:08] – [Primary Uses] JasonP | gtx [2012/05/20 10:10] (current) – [Primary Uses] JasonP | ||
---|---|---|---|
Line 42: | Line 42: | ||
* **Threat** (x2): This is how a machine attacks, by using threat. However there are generally secondary purposes for threat too, as it is the most basic way the machine can influence its environment. Simply put, as a core module this is the machines strength and prowess in humanoid form. Threat splits into two die codes: Strength and Prowess. | * **Threat** (x2): This is how a machine attacks, by using threat. However there are generally secondary purposes for threat too, as it is the most basic way the machine can influence its environment. Simply put, as a core module this is the machines strength and prowess in humanoid form. Threat splits into two die codes: Strength and Prowess. | ||
* **Mobility**: | * **Mobility**: | ||
- | * **Response**: | + | * **Response** |
- | * **Emitter** | + | * **Emitter**: |
* **Intelligence**: | * **Intelligence**: | ||
* **Sensor**: This is how a machine detects and interprets the world around it. The exact range and purpose of each sensor has to be created by its designer and discussed with the group. Each sensor splits into two die codes: Range and Detail. | * **Sensor**: This is how a machine detects and interprets the world around it. The exact range and purpose of each sensor has to be created by its designer and discussed with the group. Each sensor splits into two die codes: Range and Detail. |