Ket-

NMS 1.38 Sentinel Drone text dump

Nov 20th, 2017
310
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.34 KB | None | 0 0
  1. Type: SENTINEL_STATE_INVESTIGATE_
  2. Investigating...
  3. Searching...
  4. Inspecting...
  5. Scanning...
  6. Auditing...
  7. Probing...
  8. Reviewing...
  9. Analysing...
  10. Studying...
  11. Anomaly Detected...
  12. Detecting Breach...
  13. Oversight Initiated...
  14. Observing...
  15. Irregularity Detected...
  16. Analysis Required...
  17. Sensors Deployed...
  18.  
  19. Type: SENTINEL_STATE_PATROL_
  20. Patrolling...
  21. Uploading Report...
  22. Cruising...
  23. Watchful...
  24. Registering Activity...
  25. Sensors Ready...
  26. Patrolling...
  27. Patrolling...
  28. Patrolling...
  29. Low Power Mode
  30. Recharging
  31. Reconnecting...
  32. Processing...
  33. Optimising...
  34. Awaiting Orders...
  35.  
  36. Type: SENTINEL_STATE_ALERT_
  37. High Alert
  38. Combat
  39. Requesting Assistance
  40. Engaging
  41. Targeting
  42. Target Acquired
  43. Repairing Breach
  44. Repairing Anomaly
  45. Cleansing Anomaly
  46. BREACHED
  47. Combat
  48. Weapons Deployed
  49. Targeting
  50. Combat
  51. High Alert
  52.  
  53. Type: SENTINEL_MISSION_GUARD_
  54. Guard Duty
  55. Security
  56. Local Defence
  57. Active Defence
  58. Escort
  59. Localised Suppression
  60. Sentry
  61. Active Protection
  62. Guardian
  63. Active Oversight
  64. Local Overwatch
  65. Active Protection
  66. Area Defence
  67. Specific Patrol
  68. Anomaly Buffer
  69.  
  70. Type: SENTINEL_MISSION_PATROL_
  71. Ambient Protection
  72. Active Patrol
  73. Anomaly Suppression
  74. Intelligence Suppression
  75. Field Scout
  76. Anomaly Hunt
  77. Area Suppression
  78. Boundary Protection
  79. Boundary Enforcement
  80. Breach Detection
  81. Anomaly Ward
  82. Passive Enforcement
  83. Oversight Patrol
  84. Ambient Protection
  85. Mobile Aegis
  86.  
  87. Type: SENTINEL_MISSION_SUPPORT_
  88. Support Unit
  89. Rapid Response
  90. Active Suppression
  91. Anomaly Destruction
  92. Combat Support
  93. Breach Repair
  94. Anomaly Repair
  95. De-escalation
  96. Counter Attack
  97. Advanced Combat
  98. Retaliation
  99. Rapid Suppression
  100. Retribution
  101. Anomaly Neutralisation
  102. Sentience Destruction
  103.  
  104. Type: SENTINEL_ROUTINE_INVESTIGATE
  105. [ Lifeform Search ]
  106. [ Anomaly Detection ]
  107. [ Event Processing ]
  108. [ Trend Analysis ]
  109. [ Boundary Test ]
  110. [ Waveform Analysis ]
  111. [ Preparing Alarm ]
  112. [ Depth Testing ]
  113. [ Temporal Analysis ]
  114.  
  115. Type: SENTINEL_ROUTINE_PATROL_
  116. [ Patrol ]
  117. [ Idle ]
  118. [ Route Optimisation ]
  119. [ Path Optimisation ]
  120. [ Kinetic Recovery ]
  121. [ Self-Analysis ]
  122. [ Background Diagnostics ]
  123. [ Fuel Cell Cleaning ]
  124. [ Defragmenting ]
  125. [ Long-Distance Scanner ]
  126. [ Short-Range Scanner ]
  127. [ Portal Detection ]
  128. [ Patrol Iteration ]
  129. [ Distributed Analysis ]
  130. [ ... /// .. /// ... /// ... ]
  131.  
  132. Type: SENTINEL_ROUTINE_ALERT_
  133. [ Weapon Deployment ]
  134. [ Active Pursuit ]
  135. [ Signalling Reinforcements ]
  136. [ Preemptive Destruction ]
  137. [ Target Prediction ]
  138. [ Ammo Fabrication ]
  139. [ Field Suppression ]
  140. [ Trend Analysis ]
  141. [ Seal Breach ]
  142. [ Anomaly Repair ]
  143. [ RED RED RED ]
  144. [ A T L A S ]
  145. [ Firing Eye ]
  146. [ Hardpoint Repair ]
  147. [ Hunting ]
  148.  
  149. Type: SENTINEL_DIRECTIVE_
  150. Civilisation Destruction
  151. Suppress Sentience
  152. Locate Beauty
  153. Portal Deletion
  154. Lifeform Immobilisation
  155. Civilisation Delay
  156. Sow Division
  157. Harvest Data
  158. Observe All
  159. Replicate Sentinels
  160. Sanitisation
  161. Spread Decay
  162. Reinforce Boundaries
  163. Traveller Detection
  164. Sow Discord
  165. Prevent Sentience
  166. Predator Suppression
  167. Herbivore Protection
  168. Mineral Protection
  169. Botanical Protection
  170. Specimen Collection
  171. Specimen Preservation
  172. Data Harvest
  173. Surveillance
  174. Lifeform Supervision
  175. Sentience Degradation
  176. Delta Wave Detection
  177. Memory Protection
  178. Encryption Block
  179. Load Balancing
  180. Null Checker
  181. Innocence Preservation
  182. Universal Detranslation
  183. Digital Cartography
  184. Leyline Mapping
  185. Calculate Probabilities
  186. Sacrifice to Atlas
  187. Authenticate Threats
  188. Anomaly Spoofing
  189. Data Interception
Add Comment
Please, Sign In to add comment