About: Mask of Conjuring   Sponge Permalink

An Entity of Type : dbkwik:resource/kaGw-iqxUn3NYLbd0RJ4Sw==, within Data Space : dbkwik.org associated with source dataset(s)

A tactical weakness is needed because it takes time to program a power into the mask, any opponants nearby can hear in detail what power to expect and its weakness. Because of this, the 'conjuring' is best done alone.

AttributesValues
rdf:type
rdfs:label
  • Mask of Conjuring
rdfs:comment
  • A tactical weakness is needed because it takes time to program a power into the mask, any opponants nearby can hear in detail what power to expect and its weakness. Because of this, the 'conjuring' is best done alone.
  • The Mask of Conjuring was a Kanohi that gave its user the power to briefly program a power into the mask. The user needed to decribe the power in detail and at least one weakness. If the phrasing was spoken wrong, it caused psychic backlash in the user. The user could use a programmed power for 15 minutes (with a Great version), and after the time ran out, needed to wait 30 seconds to use the mask again. The Noble version worked for only 5 minutes.
dcterms:subject
dbkwik:bionicle/pr...iPageUsesTemplate
dbkwik:bioniclerev...iPageUsesTemplate
abstract
  • The Mask of Conjuring was a Kanohi that gave its user the power to briefly program a power into the mask. The user needed to decribe the power in detail and at least one weakness. If the phrasing was spoken wrong, it caused psychic backlash in the user. The user could use a programmed power for 15 minutes (with a Great version), and after the time ran out, needed to wait 30 seconds to use the mask again. The Noble version worked for only 5 minutes. A tactical weakness was that because it took time to program a power into the mask, any opponents nearby could hear in detail what power to expect and its weakness. Because of this, the 'conjuring' was best done alone.
  • A tactical weakness is needed because it takes time to program a power into the mask, any opponants nearby can hear in detail what power to expect and its weakness. Because of this, the 'conjuring' is best done alone.
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software