Computer/Legends

"It's amazing what computers can do these days."

- Garin

A computer was a basic form of electronic hardware used in many appliances throughout the galaxy, from droids to starfighters. A computer consisted of an input, a processor, and an output. A computer would use complex algorithms to run different protocols, from calculating numbers to controlling automated artificial life-forms, such as droids, which were run by Artificial Intelligence units. These were programs and computers that were essential to the proper functioning of the droids. Computers ran many things including datapad's, which were palm-sized personal computers used as mobile workstations and were an major part of modern life, as well as many essential systems in starships. Computers ran the Navigational computer in starships, which controlled and monitored the ship navigation, and the sensor suite. The sensors on a starship were very important, because these sensors scanned for objects and other ships. Computers ran many other important systems, such as the computers in the Jedi temple computer room ran the temple communication system before Order 66. This system allowed Jedi to communicate from other planets directly to the Temple. Computers were a modern part of life, and allowed tasks to be completed much quicker, easier, and more efficient.

Droids
"Mechanical and/or electronic construct designed and put into service to assist organic life."

- Cybot Galactica

Droids were humanoid frames, made of various materials, that were loaded with Artificial Intelligence units. The materials varied by the droids designed use. Different droids were loaded with different AI's and programs, which were classified under one of five classes. Class one droids dealt with medicine, mathematics, and physical sciences. Class two droids dealt with engineering tasks, environmental work, and repairing starships. Class three droids interacted with organic beings in tasks dealing with protocol, tutoring, and child care. Class four droids included security droids and assassin droids. Class five droids were for basic labor. Astromech droids were loaded with navigational, repair, and ship design computer programs that allowed them to preform these tasks. While Protocol droid AI units were loaded with Language, Diplomatic, and other Computer programs. Medical droids contained programs that dealt with medications, surgical procedures, biology, and other medical protocols. Astromech droids such as R2-D2 and T3-M4 were very talented at slicing. R2 was able to open virtually any door, which has saved many lives. R2 was able to open the doors on the shield base on Endor, allowing the Death Star to be destroyed. As well as opening the doors on Bespin, to try and reach Han Solo and Boba Fett.

Starships
"With the Falcon's sensors, it's like seeing the future. You'll know where each Imperial fighter is headed before the TIE pilots have made a move."

- Lando Calrissian

Among computers, some were made for specific tasks, such as Navigation computer's or nav computers. These computers were specialized processing units used to calculate hyperspace and realspace jumps, trajectories, and routes. These computers plotted routes based on received drift charts and other navigational data based on the data received from the ship sensor array. The Millennium Falcon was equipped with a FabritechANq-51 sensor array computer. This sensor allowed the Millennium Falcon to scan up to 500,000 Kilometers for ships and other objects. Sensor arrays have a long-range sensor device, to scan around the ship; a computer to read the sensor data; and a display to show the data. There are many different types of sensors: Passive-mode sensors, which gather immediate area data; Scan-mode (Active sensors), which collect long-range data; Search-mode sensors, which scan specific areas; and Focus-mode sensors, which scan small areas with great accuracy. Full-spectrum (universal sensors) have multiple scanners that scan in different ranges and modes to detect nearly all objects, emissions, or energy fields. Electrophoto receptors (EPR's) are short-range visual scanners combining infrared, ultraviolet, and standard ranges to gather information. These scanners can focus on emissions left by engines, heat, comm transmissions, and weapons. Most scanners can also detect organics, gravitational anomalies, and disturbances in hyperspace All of these sensors are controlled and monitored by the ship computer, which sends the data to the operator through text or graphics on a data screen.

Slicers and hackers
"He showed me how to slice into a computer's security system; how to get inside a locked building without the entrance codes, and how to spot a wealthy mark for a quick shell game."

- Mission, about her brother Griff

Where there were computers, there were safeguards. Passwords, retinal scanners, fingerprint scanners, and voice-recognition were among these. These safeguards were programs that protected a persons personal data and unauthorized use of the computer, but programs could be made to find glitches, introduce viruses, spy-ware, and ways to get around those safeguards. The people that dealt with these illegal programs were called Slicers. Slicers used computer programs that were usually self-made to find the glitches and loop-holes, as well as slicing by hand. Slicing by hand took very detailed knowledge of computers and skill to hack using sheer knowledge of code to cheat around security and find passwords through information around them. Some companies made anti-security devices to hack through security, such as the Anti-register device. . Slicers used their computer and hacking skills to cheat people out of money in their bank accounts, steal personal information to obtain profit, and access information that is restricted. Even though it was illegal, many criminals indulged into the role of slicing. Republic Commando units were taught to slice into computers blocking their path or to get information needed to complete their mission for the good of the Republic. Though Jaing, a Null-class Advanced Recon Commando created and introduced a virus into thousands of banks, that siphoned off very small amounts of credits out of millions of bank accounts, which led to him gaining billions of credits. .

Anti-Security devices
Anti-Security devices were created to break security without needing to hand slice, or making programs to slice. Several known Anti-Security devices include: An Anti-register device was a tool that enabled the user to crack into any-print reliable security system, thought the only one known was destroyed on Phindar during its liberation.
 * Anti-register device

An Electronic Lock Breaker was an anti-security device that could override alarms and open most computerized locks and were carried by most slicers, criminals, espionage agents, bounty hunters, and thieves.
 * Electronic lock breaker

A Slicer Chip was a miniaturized electronic lock breaker that was specifically modified to hack into computers, droids, and automated devices.
 * Slicer chip

A Universal Jammer was a sensor countermeasure device the was able to foil most common scanners, and were extremely expensive.
 * Universal jammer