This HTML5 document contains 21 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n12http://dbkwik.webdatacommons.org/resource/rkTaudfazPqz2HAHy6y4fw==
n13http://dbkwik.webdatacommons.org/resource/_94rCCIQPbjhKkoi3asLYA==
n15http://dbkwik.webdatacommons.org/ontology/
n18http://dbkwik.webdatacommons.org/resource/2DKFQQbCr17Web9YHkpyQg==
dctermshttp://purl.org/dc/terms/
n5http://dbkwik.webdatacommons.org/resource/jhir1P_SOVN35JsovBCKCA==
n24http://dbkwik.webdatacommons.org/resource/Emlj-lLqpVBhg_EFQMhEpA==
n10http://dbkwik.webdatacommons.org/resource/ACxu2rwtq3ZWBSeNXjVNxg==
n6http://dbkwik.webdatacommons.org/resource/7fAfRYIFav_Q4ylAYVXTDA==
rdfshttp://www.w3.org/2000/01/rdf-schema#
n14http://dbkwik.webdatacommons.org/resource/xoykDFxJFBgF02W_HRnEzw==
n2http://dbkwik.webdatacommons.org/resource/LNfYF620dNVq0SWchEcPMA==
n20http://dbkwik.webdatacommons.org/resource/TgOVbXtoSofCtrjpr1F5Hw==
n23http://dbkwik.webdatacommons.org/resource/KXntk66Rd4iFSu7kfIMiVw==
n4http://dbkwik.webdatacommons.org/resource/9QoHp560f0X9eeMsR7N4Vg==
n21http://dbkwik.webdatacommons.org/resource/EW1bJq3W_W7cdIpAD2X4sw==
n8http://dbkwik.webdatacommons.org/resource/5bQEMqd2ay5tc5cU5rUB7g==
n16http://dbkwik.webdatacommons.org/resource/-vyOJcy-qX3zDqjznLpOWw==
n17http://dbkwik.webdatacommons.org/resource/dq5BXkyK2a8gi5bEnOnaaw==
n19http://dbkwik.webdatacommons.org/resource/RvC46W7sFC6UXp5N54FaVQ==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n11http://dbkwik.webdatacommons.org/powerlisting/property/
n7http://dbkwik.webdatacommons.org/resource/2_BOtlZONuFtW24JzHKNqQ==
n22http://dbkwik.webdatacommons.org/resource/GTMTU1uECQhyO8e8Aao1MA==
xsdhhttp://www.w3.org/2001/XMLSchema#
Subject Item
n2:
rdf:type
n14:
rdfs:label
Malware Generation
rdfs:comment
The user can create/generate and send different types of Malware, including viruses and Trojan horses, to infect, corrupt or destroy digital hardware or digital beings.
dcterms:subject
n4: n5: n6: n8: n10: n18: n19: n21: n23: n24:
n22:
Generate malwares
n17:
Power/Ability to:
n7:
Malware Generation
n20:
Virusmon can generate and spread his digital viruses to corrupt other apply monsters.
n11:wikiPageUsesTemplate
n12:
n13:
330
n16:
#353839
n15:abstract
The user can create/generate and send different types of Malware, including viruses and Trojan horses, to infect, corrupt or destroy digital hardware or digital beings.