Computers

Use this skill to access computer systems and write or modify computer programs, to reprogram droids, and to override or bypass computer controlled devices.

Check
Most normal computer operations(such as running a program) don't require a skill check. However, conducting a complex search through numerous databases, writing computer programs to make complex calculations or manipulate data in specific ways, altering existing programs to perform differently(better or worse), and breaking through computer security are all relatively difficult and require skill checks.

Conduct Complex Search
Researching a topic on the Holonet(or its equivalent in different eras) with a combination of search engines and a lot of site hits takes time, skill, and some luck. The GM determines how obscure the topic is(the more obscure the higher the DC) and what kind of information might be available. In some cases, the GM might require that the character break into a secure site before conducting a search to obtain certain kinds of information.

Information ranges from the general to protected. For example, locating general information about a senator is easier than gathering specific information(such as the senator's date of birth), which is easier than finding restricted information(such as the senator's private comm code), which is easier than uncovering protected information(such as the senator's cred stick code). * Usually requires a check to break into a site before a search can be made.

Write Program
The DC depends on the nature of the program and its purpose, ranging from 15 for simple programs(such as databases and accounting applications) to 30 for complex programs(such as maintenance analysis applications or security protocol systems).

Alter Programs
Its generally easier to alter and existing program than to create a new one from scratch. The DC depends on what the alteration sets out to accomplish and whether or not the user wants his "tampering" to be readily obvious. a Multiple alterations of the same type are not cumulative.

b See chapter 15: Droids for details

Break Computer Security
Also called "slicing", this application of Computers can't be used unntrained. In cases where the user is actively combating the sicer's efforts, a slicer has to be an opposing computer user's check. In general, though, the DC is determined by the quality of the security program installed to defend the system. If the check fails by 10 or more, the security system immediately alerts its administrator that there has been an unauthorized entry.

Operate Remote
Many devices- security cameras, communications arrays, door locks, sentry guns, alarms, and so forth- are computer-operated via remote links. A slicer can access these various systems and either shut them off, or change their operating parameters(to make Corporate Sector cameras identify CSA agents as enemies for example, or set an automated Imperial sentry gun to attack stormtroopers). If the check fails by 10 or more, the security system immediately alerts its administrator that there has been an unauthorized entry.

Ship Systems
On ships that require more than one operator, a character's Computers skill is employed to determine the success of using sensors, weapons, and communications jamming. The better the check when operating sensors, the more detailed the information discovered. Note that sensors in the Star Wars unniverse are not miraculous divination devices. At best, they provide detection and identification based on what can be seen, measured, and analyzed: the number of enemy vessels, the type of enemy vessels, the basic makeup of a planetary atmosphere, any visible obstacles or dangers in the immediate vicinity, and so forth.

Special
You can take 10 when using the Computers skill. In cases that don't involve a pealty for failure, you can take 20.

A character with the Gearhead feat gets a +2 aptitude bonus on Computers checks.

Time
Computers requires at least a full round action, the GM may determine that some tasks take require several rounds, a few minutes, or longer as described above.