Movatterモバイル変換


[0]ホーム

URL:


Wookieepedia

To improve your ad experience,create an account.
Join Wookieepedia today!

READ MORE

Wookieepedia
Don't have an account?
Register
Sign In
Skip to content
Wookieepedia
221,996
pages
This article details a subject that falls under the Legends continuity.
Click here for Wookieepedia's article on the Canon version of this subject. This article covers the Legends version of this subject. 

OnALegendsArticleGoToCanon

Computer Expertise

Computer

Production information

Locations

Galaxy-wide

Physical and technical specifications

Structure

Tower (unless built into monitor), Display, and Interface (input-output)

Usage and history

Purpose

Multipurpose

"It's amazing what computers can do these days."
Garin[1]

Acomputer was a ubiquitous piece of hardware utilized in a multitude of applications throughout thegalaxy, fromdroids tostarfighters todatapads. A computer consisted of an input system, a processor to accomplish tasks, and an output to relay information or commands. A computer generally used complex mathematics to run varying protocols, such as numerical calculations, synchronous communication (with encryption), sensor interpretation and coordination, even the complex systems of artificial life-forms, such as droids, built around anartificial intelligence.

The complete details of computer systems, sub-routines, computing languages and processing functionality are probably too manifold to specify in a comprehensible fashion. However, the clear purpose and usage of computer systems throughout thegalaxy can be enumerated and commented on at length.

Aminicomputer referred to a smaller version of a computer.

Data[]

Personal computing[]

In everyday life throughout the galaxy, sentients of all types used computers to work more efficiently, store and retrieve information and communicate extensively.

A commonly used device was adatapad, the computing capacity of a datapad allowed for it to interface with other computer systems, at times analyze surroundings through sensors, even play holo-recordings for informational or entertainment purposes. These personal computing devices could serve as mobile workstations to access and maintain facility and starship systems through wireless and hard-wired connections.The systems within personal starships were all coordinated and integrated through computers. TheNavigation computer, also known as a "navicomputer", is a prime example. TheHyperdrive and navigational systems needed to communicate in order for travel inHyperspace to be possible. At the heart of this communication was the Navicomputer, a computing device that factored the location of the given starship, desired destination, and intended travel route through Hyperspace in order to determine a safe route for the starcraft. This required the accessing and processing of starcharts, interpretation of sensor data from the ship's own sensors, communication with the systems of theHyperdrive and its various failsafes as well as diagnostics of every involved system. The Ship's computer handles all of these tasks with near instantaneous results and an incredibly high rate of success and efficacy.Numerous facilities and affiliations maintain and use computer systems for informational and organizational purposes. TheJedi Order maintained an information archive, in effect a massive encyclopedic computer system for data storage and access. A communication system built around computers with a beacon to alert traveling Jedi to recent events was used. A Holo-security recording system was run via computers on theJedi Temple premises. These are just some of the applications of computers known throughout the galaxy.

Droids[]

"Mechanical and/or electronic construct designed and put into service to assist organic life."
Cybot Galactica[2]
Blue Glass Arrow Main article:Droid
An ,  and

AnR5,R4 andR7-series astromech droid

Droids werehumanoid frames, made of various materials, that were loaded withartificial intelligence units. The materials varied by the droids designed use. Different droids were loaded with different AI's and programs, which were classified under one of five classes. Class one droids dealt with medicine, mathematics, and physical sciences.[2]Class two droids dealt with engineering tasks, environmental work, and repairingstarships.[2]Class three droids interacted withorganic beings in tasks dealing with protocol, tutoring, and child care.[2]Class four droids included security droids and assassin droids.[2] Class five droids were for basic labor.[2]Astromech droids were loaded with navigational, repair, and ship design computer programs that allowed them to preform these tasks. WhileProtocol droid AI units were loaded withLanguage, Diplomatic, and other Computer programs. Medical droids contained programs that dealt with medications, surgical procedures, biology, and other medical protocols.Astromech droids such asR2-D2 andT3-M4 were very talented at slicing. R2 was able to open virtually any door, which has saved many lives. R2 was able to open the doors on the shield base on Endor, allowing theDeath Star to be destroyed. As well as opening the doors onBespin, to try and reachHan Solo andBoba Fett.

Starships[]

"With the Falcon's sensors, it's like seeing the future. You'll know where each Imperial fighter is headed before the TIE pilots have made a move."
Lando Calrissian[3]
Blue Glass Arrow Main article:Starship

Among computers, some were made for specific tasks, such asNavigation computer's or nav computers. These computers were specialized processing units used to calculate hyperspace and realspace jumps, trajectories, and routes.[4] These computers plotted routes based on received drift charts and other navigational data based on the data received from the ship sensor array. TheMillennium Falcon was equipped with aFabritechANq-51 sensor array computer. This sensor allowed the Millennium Falcon to scan up to 500,000 Kilometers for ships and other objects. Sensor arrays have a long-range sensor device, to scan around the ship; a computer to read the sensor data; and a display to show the data. There are many different types of sensors: Passive-mode sensors, which gather immediate area data; Scan-mode (Active sensors), which collect long-range data; Search-mode sensors, which scan specific areas; and Focus-mode sensors, which scan small areas with great accuracy. Full-spectrum (universal sensors) have multiple scanners that scan in different ranges and modes to detect nearly all objects, emissions, or energy fields. Electrophoto receptors (EPR's) are short-range visual scanners combining infrared, ultraviolet, and standard ranges to gather information. These scanners can focus on emissions left by engines, heat, comm transmissions, and weapons. Most scanners can also detect organics, gravitational anomalies, and disturbances inhyperspace[3] All of these sensors are controlled and monitored by the ship computer, which sends the data to the operator through text or graphics on a data screen.[3]

Slicers and hackers[]

A slicer gains unauthorized access to a computer.

A slicer gains unauthorized access to a computer.

"He showed me how to slice into a computer's security system; how to get inside a locked building without the entrance codes, and how to spot a wealthy mark for a quick shell game."
―Mission, about her brother Griff[5]
Blue Glass Arrow Main article:Slicer

Where there were computers, there were safeguards. Passwords, retinal scanners, fingerprint scanners, and voice-recognition were among these. These safeguards were programs that protected a persons personal data and unauthorized use of the computer, but programs could be made to find glitches, introduce viruses, spy-ware, and ways to get around those safeguards. The people that dealt with these illegal programs were calledslicers. Slicers used computer programs that were usually self-made to find the glitches and loop-holes, as well as slicing by hand. Slicing by hand took very detailed knowledge of computers and skill to hack using sheer knowledge of code to cheat around security and find passwords through information around them. Some companies made anti-security devices to hack through security, such as theAnti-register device.[3] Slicers used their computer and hacking skills to cheat people out of money in their bank accounts, steal personal information to obtain profit, and access information that is restricted. Even though it was illegal, many criminals indulged into the role of slicing.Republicclone commando units were taught to slice into computers blocking their path or to get information needed to complete their mission for the good of the Republic.[6] Though Jaing, aNull-class Advanced Recon Commando created and introduced a virus into thousands of banks, that siphoned off very small amounts of credits out of millions of bank accounts, which led to him gaining billions of credits.[7]

Anti-Security devices[]

Anti-Security devices were created to break security without needing to hand slice, or making programs to slice.Several known Anti-Security devices include:

An Anti-register device was a tool that enabled the user to crack into any-print reliable security system, thought the only one known was destroyed onPhindar during its liberation.[3]

An Electronic Lock Breaker was an anti-security device that could override alarms and open most computerized locks and were carried by most slicers, criminals, espionage agents, bounty hunters, and thieves.[3]

A Slicer Chip was a miniaturized electronic lock breaker that was specifically modified to hack into computers, droids, and automated devices.[3]

A Universal Jammer was a sensor countermeasure device the was able to foil most common scanners, and were extremely expensive.[3]

Usage[]

During the early stages of the Galactic Civil War, a passenger attempted to bring a tablet computer along for a ride. However, it ended up deleted by the baggage check droid,G2-9T, after some miscommunication withSpaceport THX1138's main computer regarding what the object was.[8]

Behind the scenes[]

Computers were a type of technology present in both the Star Wars franchise and in real life.

The tablet computer that G2-9T accidentally destroyed was a MacBook.[8]

Appearances[]

Non-canon appearances[]

Sources[]

Notes and references[]

External links[]

In other languages
Community content is available underCC-BY-SA unless otherwise noted.
More Fandoms

[8]ページ先頭

©2009-2025 Movatter.jp