Last active
October 6, 2021 02:13
-
-
Save y-ack/56184d33f0f6e764a64cad5a23a146e0 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
let techspooks = ["NFT","Windows 11","swarm computing","massively multiplayer","6D","3D","4D","4.21-bit","5.0","5g","6g","8-bit","128-bit","10x engineer","adversarial","agile","AI","algorithm","always-online","as a Service","Assistant","big data","bitcoin","black box","blast processing","blockchain","brain interface","buffer overflow","C++","camel-case","CI/CD","cloud","Code of Conduct","coin","combinator","crowdfunding","crowdsourcing","crypto","cyber","data mining","database","decentralized","deep learning","deep web","DevOps","discrimination","E2EE","easy deployment","edge computing","encrypted","enterprise","emoji support","event-driven","federated","floating point","fog-computing","FPGA","free","functional","gaming","garbage collection","generative","generator","graphics","hardcoded","hardware","hash","infinite","instruction manual","IoT","Java","keylogger","L-system","lifelike","linear search","list","localhost","lootbox","low-latency","machine learning","man-in-the-middle","microservice","minimalist","Mixed Reality","memristor","mobile","monads","Murphy's Law","nanoscale","natural language","neural network","new","next-gen","Node.js","nondeterministic","NSA backdoor","object-oriented","one-click","open-source","pornbot","predictive","prisoner's dilemma","programming","programming","protocol","public key","Python","quantum","quantum-resistant","racist","radiation hardening","recursive","REST","row hammer","SaaS","scalable","scientific","secure","server","sexist","simulation","smart TV","software","sort","SQL injection","string","structured","surveillance","technology","telnet","token ring","type system","unaccountability","unicode","vintage","VR","wireless","worm","XML","zero-day","(for private channels)"]; | |
function techspook(n){ | |
let num = Number.parseInt(n) || 4; | |
let string = ''; | |
for(i = 0; i < num; i++) { | |
string += techspooks[Math.floor(Math.random() * techspooks.length)] + ' '; | |
} | |
return(string); | |
}; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
let techspooks = ["3D","4D","4.21-bit","5.0","5g","6g","8-bit","128-bit","10x engineer","adversarial","agile","AI","algorithm","always-online","as a Service","Assistant","big data","bitcoin","black box","blast processing","blockchain","brain interface","buffer overflow","C++","camel-case","CI/CD","cloud","Code of Conduct","coin","combinator","crowdfunding","crowdsourcing","crypto","cyber","data mining","database","decentralized","deep learning","deep web","DevOps","discrimination","E2EE","easy deployment","edge computing","encrypted","enterprise","emoji support","event-driven","federated","floating point","fog-computing","FPGA","free","functional","gaming","garbage collection","generative","generator","graphics","hardcoded","hardware","hash","infinite","instruction manual","IoT","Java","keylogger","L-system","lifelike","linear search","list","localhost","lootbox","low-latency","machine learning","man-in-the-middle","microservice","minimalist","Mixed Reality","memristor","mobile","monads","Murphy's Law","nanoscale","natural language","neural network","new","next-gen","Node.js","nondeterministic","NSA backdoor","object-oriented","one-click","open-source","pornbot","predictive","prisoner's dilemma","programming","programming","protocol","public key","Python","quantum","quantum-resistant","racist","radiation hardening","recursive","REST","row hammer","SaaS","scalable","scientific","secure","server","sexist","simulation","smart TV","software","sort","SQL injection","string","structured","surveillance","technology","telnet","token ring","type system","unaccountability","unicode","vintage","VR","wireless","worm","XML","zero-day","(for private channels)"]; | |
commands.push(new Command("techspook",function(param){ | |
let num = Number.parseInt(param) || 4; | |
let string = ''; | |
for(i = 0; i < num; i++) { | |
string += techspooks[Math.floor(Math.random() * techspooks.length)] + ' '; | |
} | |
localModuleMessage(string); | |
})) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment