Guest User

Untitled

a guest
Feb 18th, 2018
97
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.68 KB | None | 0 0
  1. [B]1) SF Name:[/B]
  2.  
  3. Neon
  4.  
  5. [B]2) Steam ID:[/B]
  6.  
  7. [B]3) Digital Identification Request (The four digits you wish to have):[/B]
  8.  
  9. 9483
  10.  
  11. [B]4) How long have you been playing at TnB's Terminator Roleplay?[/B]:
  12.  
  13. I've been playing on the Terminator roleplay server since day one. I understand the concepts and chronicles that invoke roleplay in the server. I think it is critical to understand these sentiments of how roleplay should really be personified.
  14.  
  15. [B]5) What current characters do you roleplay on the server, be it human or drone:[/B]
  16.  
  17. I roleplay as Pfc. James Nguyen, and my wasteland character Billy Neoko. I have roleplayed as a trial drone in the past but was declined to become an 800 due to my inactivity on it. My activity on the server as of late has been much higher, despite the lower server population.
  18.  
  19. [B]6) Stealth and situational awareness are key to successful infiltration. Provide an example of such roleplay (At least two paragraphs.):[/B]
  20.  
  21. An Infiltration unit should keep it's identity secured and veiled. An infiltration unit focuses on using concealment tactics to accomplish their tasks at hand. A unit would not be successful in doing so, if they did not earn the trusts of the inhabitants of the bunker or encampment. If an infiltrator did not use those tactics, they would fall short from their task if anyone reveals their identity.
  22.  
  23. I believe that an infiltrator should solely engage in group conversations within the encampment with local dwellers to gain trust and certainty and most critically, intel. In another case, if a infiltrator unit we're to isolate himself from the rest, he would personally have no connections to reach it's task, and if people we're to spot a isolated man always standing around, witnessing what's going on around him-- It would seem a bit suspicious. Relationships with camp dwellers are utterly most important, because they could in some cases, introduce you to your target, or could actually be the target himself. Once you gain trusts, they will, in most cases, ask you favors or ask to go out on patrol and isolate themselves from camp-- Which could grant you potentially the ability to assassinate the target.
  24.  
  25. Which brings me to situational awareness, assassinating your target may seem like a effortless task, however it's not. You must ensure that there are no obstacles between you and your target. A successful assassination must be intelligently planned out, by taking these matters in a slowed and ensured fashion. Eliminating any obstructions that stand before you and your target must be cleared, or avoided.
  26.  
  27. [B]7) Define the differences between a human and a standard Infiltration unit thoroughly[/B]
  28.  
  29. The humans have feelings, and emotions. They have lives and backgrounds in spite of appearance, each and every single one of them has a story behind them. Humans we're born from a mothers womb, raised as a child, and survives off food, water, and love. They can express their feelings freely. Infiltrator drones we're manufactured in a factory, and their main task implemented in their database is to eliminate humanity. Infiltrator drones can only mimic a persons feelings, they also cant be reasoned with. They mimic everything to achieve their goals.
  30.  
  31. [B]8) Describe the differences between a T-800 infiltration unit and a T-888 infiltration unit:[/B]
  32.  
  33. The T-800 infiltration unit, while a very advanced machine, is still quite bulky and large, though not nearly as much as a T-600. It also was the first to use real human tissue over the endoskeleton, making it harder to spot. It is, however, lacking in any information regarding human behavior. It has to learn everything about human behavior and speech through experience, making a newly created 800 stand out when they interact with others.It is capable of replicating human behavior after some extended interaction with them and observation, this is provided though that they last that long.
  34.  
  35. In contrast, the T-888 is not only smarter, in terms of an upgraded CPU, it is also stronger, faster, and much more capable of infiltration. It's endoskeleton is made of hyper-alloy, and is also constructed with a considerable amount of Coltan, making it very resistant to plasma. In addition, the frame of the T-888 is more streamlined, making it look more human-like. It is programmed with a knowledge of human anatomy, making it an efficient killer and capable of causing great pain to others. Aside from that, the main improvement is that it learns faster and is programmed with a base knowledge of human behavior.
  36.  
  37. [B]9.) What is standard operational procedure if you are compromised?[/B]
  38.  
  39. The standard operational procedure if a infiltrator drone is compromised is to obviate from being seized by the resistance faction. Most likely resistance will reprogram the infiltration unit and use the drone itself as a weapon against skynet. If however, things come down to not being able to avoid capture-- The infiltration unit will most likely have to destroy anything in it's way to obviate from being reprogrammed. If completing your task is plausible, then the infiltrator drone must proceed in doing so, completing the task successfully is the top priority.
  40.  
  41.  
  42. [B]10.) What do you plan on bringing to the roleplay, and what do you plan on taking away from the infiltration division?:[/B]
  43.  
  44. What I plan on bringing to roleplay is a couple elements of intimidation and scare tactics to the bunker dwellers. Being a bunker dweller and knowing that any person that you are socializing with or walking past could be a infiltrator drone is also a tactic of psychological warfare. However, I'm ambivalent about taking something away from the infiltration division because I have yet to discern any flaws from what I have seen in the past.
Add Comment
Please, Sign In to add comment